[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2012-05-02 Thread Paolo Pisati
** Changed in: linux-ti-omap4 (Ubuntu)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2012-05-02 Thread Jamie Strandboge
The linux-linaro kernel is community maintained and should be tracked in
its own bug and not part of the supported kernel cadence process. If
someone would like to provide updates for the linux-linaro kernel,
please file a new bug and follow
https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures. Thanks.

** Changed in: linux-linaro (Ubuntu Lucid)
   Status: New = Won't Fix

** Changed in: linux-linaro (Ubuntu Maverick)
   Status: New = Won't Fix

** Changed in: linux-linaro (Ubuntu Natty)
   Status: New = Won't Fix

** Changed in: linux-linaro (Ubuntu Oneiric)
   Status: New = Won't Fix

** Changed in: linux-linaro (Ubuntu Hardy)
   Status: New = Won't Fix

** Changed in: linux-linaro (Ubuntu)
   Status: New = Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2012-02-24 Thread Jamie Strandboge
** Changed in: linux-lts-backport-oneiric (Ubuntu)
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2012-01-30 Thread Paolo Pisati
** Changed in: linux-ti-omap4 (Ubuntu Oneiric)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-11-08 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.32-35.78

---
linux (2.6.32-35.78) lucid-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #871899

  [ Andrew Dickinson ]

  * SAUCE: sched: Prevent divide by zero when cpu_power is 0
- LP: #614853

  [ Stefan Bader ]

  * [Config] Force perf to use libiberty for demangling
- LP: #783660

  [ Tim Gardner ]

  * [Config] Simplify binary-udebs dependencies
- LP: #832352
  * [Config] kernel preparation cannot be parallelized
- LP: #832352
  * [Config] Linearize module/abi checks
- LP: #832352
  * [Config] Linearize and simplify tree preparation rules
- LP: #832352
  * [Config] Build kernel image in parallel with modules
- LP: #832352
  * [Config] Set concurrency for kmake invocations
- LP: #832352
  * [Config] Improve install-arch-headers speed
- LP: #832352
  * [Config] Fix binary-perarch dependencies
- LP: #832352
  * [Config] Removed stamp-flavours target
- LP: #832352
  * [Config] Serialize binary indep targets
- LP: #832352
  * [Config] Use build stamp directly
- LP: #832352
  * [Config] Restore prepare-% target
- LP: #832352
  * [Config] Fix binary-% build target
  * [Config] Fix install-headers target
- LP: #832352
  * SAUCE: igb: Protect stats update
- LP: #829566
  * SAUCE: rtl8192se spams log
- LP: #859702

  [ Upstream Kernel Changes ]

  * Add mount option to check uid of device being mounted = expect uid,
CVE-2011-1833
- LP: #732628
- CVE-2011-1833
  * crypto: Move md5_transform to lib/md5.c
- LP: #827462
  * net: Compute protocol sequence numbers and fragment IDs using MD5.
- LP: #827462
  * ALSA: timer - Fix Oops at closing slave timer
- LP: #827462
  * ALSA: snd-usb-caiaq: Fix keymap for RigKontrol3
- LP: #827462
  * powerpc: Fix device tree claim code
- LP: #827462
  * powerpc: pseries: Fix kexec on machines with more than 4TB of RAM
- LP: #827462
  * Linux 2.6.32.45+drm33.19
- LP: #827462
  * ipv6: make fragment identifications less predictable, CVE-2011-2699
- LP: #827685
- CVE-2011-2699
  * tunnels: fix netns vs proto registration ordering
- LP: #823296
  * Fix broken backport for IPv6 tunnels in 2.6.32-longterm kernels.
  * USB: xhci: fix OS want to own HC
- LP: #837669
  * USB: assign instead of equal in usbtmc.c
- LP: #837669
  * USB: usb-storage: unusual_devs entry for ARM V2M motherboard.
- LP: #837669
  * USB: Serial: Added device ID for Qualcomm Modem in Sagemcom's HiLo3G
- LP: #837669
  * atm: br2864: sent packets truncated in VC routed mode
- LP: #837669
  * hwmon: (ibmaem) add missing kfree
- LP: #837669
  * ALSA: snd-usb-caiaq: Correct offset fields of outbound iso_frame_desc
- LP: #837669
  * mm: fix wrong vmap address calculations with odd NR_CPUS values
- LP: #837669
  * perf tools: do not look at ./config for configuration
- LP: #837669
  * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel
oops
- LP: #837669
  * befs: Validate length of long symbolic links.
- LP: #837669
  * ALSA: snd_usb_caiaq: track submitted output urbs
- LP: #837669
  * ALSA: ac97: Add HP Compaq dc5100 SFF(PT003AW) to Headphone Jack Sense
whitelist
- LP: #826081, #837669
  * futex: Fix regression with read only mappings
- LP: #837669
  * x86-32, vdso: On system call restart after SYSENTER, use int $0x80
- LP: #837669
  * x86, UV: Remove UV delay in starting slave cpus
- LP: #837669
  * drm/ttm: fix ttm_bo_add_ttm(user) failure path
- LP: #837669
  * fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
- LP: #837669
  * igb: Fix lack of flush after register write and before delay
- LP: #837669
  * Linux 2.6.32.46
- LP: #837669
  * cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191
- LP: #834135
- CVE-2011-3191
  * Bluetooth: Prevent buffer overflow in l2cap config request,
CVE-2011-2497
- LP: #838423
- CVE-2011-2497
  * core: Fix memory leak/corruption on VLAN GRO_DROP, CVE-2011-1576
- LP: #844361
- CVE-2011-1576
  * ext4: Fix max file size and logical block counting of extent format
file, CVE-2011-2695
- LP: #819574
- CVE-2011-2695
  * drm/i915: prepare for fair lru eviction
- LP: #843904
  * drm/i915: Move the eviction logic to its own file.
- LP: #843904
  * drm/i915: Implement fair lru eviction across both rings. (v2)
- LP: #843904
  * drm/i915: Maintain LRU order of inactive objects upon access by CPU
(v2)
- LP: #843904
  * drm/i915/evict: Ensure we completely cleanup on failure
- LP: #843904
  * drm/i915: Periodically flush the active lists and requests
- LP: #843904
  * Make TASKSTATS require root access, CVE-2011-2494
- LP: #866021
- CVE-2011-2494
  * proc: fix a race in do_io_accounting(), CVE-2011-2495
- LP: #866025
- CVE-2011-2495
  * drm/i915: Remove BUG_ON from 

[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-10-25 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ec2 - 2.6.32-319.39

---
linux-ec2 (2.6.32-319.39) lucid-proposed; urgency=low

  [ Stefan Bader ]

  * Rebased to 2.6.32-35.78
  * Release Tracking Bug
- LP: #873063

  [ Ubuntu: 2.6.32-35.78 ]

  * [Config] Force perf to use libiberty for demangling
- LP: #783660
  * [Config] Simplify binary-udebs dependencies
- LP: #832352
  * [Config] kernel preparation cannot be parallelized
- LP: #832352
  * [Config] Linearize module/abi checks
- LP: #832352
  * [Config] Linearize and simplify tree preparation rules
- LP: #832352
  * [Config] Build kernel image in parallel with modules
- LP: #832352
  * [Config] Set concurrency for kmake invocations
- LP: #832352
  * [Config] Improve install-arch-headers speed
- LP: #832352
  * [Config] Fix binary-perarch dependencies
- LP: #832352
  * [Config] Removed stamp-flavours target
- LP: #832352
  * [Config] Serialize binary indep targets
- LP: #832352
  * [Config] Use build stamp directly
- LP: #832352
  * [Config] Restore prepare-% target
- LP: #832352
  * [Config] Fix binary-% build target
  * [Config] Fix install-headers target
- LP: #832352
  * SAUCE: igb: Protect stats update
- LP: #829566
  * SAUCE: rtl8192se spams log
- LP: #859702
  * Add mount option to check uid of device being mounted = expect uid,
CVE-2011-1833
- LP: #732628
- CVE-2011-1833
  * crypto: Move md5_transform to lib/md5.c
- LP: #827462
  * net: Compute protocol sequence numbers and fragment IDs using MD5.
- LP: #827462
  * ALSA: timer - Fix Oops at closing slave timer
- LP: #827462
  * ALSA: snd-usb-caiaq: Fix keymap for RigKontrol3
- LP: #827462
  * powerpc: Fix device tree claim code
- LP: #827462
  * powerpc: pseries: Fix kexec on machines with more than 4TB of RAM
- LP: #827462
  * Linux 2.6.32.45+drm33.19
- LP: #827462
  * ipv6: make fragment identifications less predictable, CVE-2011-2699
- LP: #827685
- CVE-2011-2699
  * tunnels: fix netns vs proto registration ordering
- LP: #823296
  * Fix broken backport for IPv6 tunnels in 2.6.32-longterm kernels.
  * USB: xhci: fix OS want to own HC
- LP: #837669
  * USB: assign instead of equal in usbtmc.c
- LP: #837669
  * USB: usb-storage: unusual_devs entry for ARM V2M motherboard.
- LP: #837669
  * USB: Serial: Added device ID for Qualcomm Modem in Sagemcom's HiLo3G
- LP: #837669
  * atm: br2864: sent packets truncated in VC routed mode
- LP: #837669
  * hwmon: (ibmaem) add missing kfree
- LP: #837669
  * ALSA: snd-usb-caiaq: Correct offset fields of outbound iso_frame_desc
- LP: #837669
  * mm: fix wrong vmap address calculations with odd NR_CPUS values
- LP: #837669
  * perf tools: do not look at ./config for configuration
- LP: #837669
  * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel
oops
- LP: #837669
  * befs: Validate length of long symbolic links.
- LP: #837669
  * ALSA: snd_usb_caiaq: track submitted output urbs
- LP: #837669
  * ALSA: ac97: Add HP Compaq dc5100 SFF(PT003AW) to Headphone Jack Sense
whitelist
- LP: #826081, #837669
  * futex: Fix regression with read only mappings
- LP: #837669
  * x86-32, vdso: On system call restart after SYSENTER, use int $0x80
- LP: #837669
  * x86, UV: Remove UV delay in starting slave cpus
- LP: #837669
  * drm/ttm: fix ttm_bo_add_ttm(user) failure path
- LP: #837669
  * fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
- LP: #837669
  * igb: Fix lack of flush after register write and before delay
- LP: #837669
  * Linux 2.6.32.46
- LP: #837669
  * cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191
- LP: #834135
- CVE-2011-3191
  * Bluetooth: Prevent buffer overflow in l2cap config request,
CVE-2011-2497
- LP: #838423
- CVE-2011-2497
  * core: Fix memory leak/corruption on VLAN GRO_DROP, CVE-2011-1576
- LP: #844361
- CVE-2011-1576
  * ext4: Fix max file size and logical block counting of extent format
file, CVE-2011-2695
- LP: #819574
- CVE-2011-2695
  * drm/i915: prepare for fair lru eviction
- LP: #843904
  * drm/i915: Move the eviction logic to its own file.
- LP: #843904
  * drm/i915: Implement fair lru eviction across both rings. (v2)
- LP: #843904
  * drm/i915: Maintain LRU order of inactive objects upon access by CPU
(v2)
- LP: #843904
  * drm/i915/evict: Ensure we completely cleanup on failure
- LP: #843904
  * drm/i915: Periodically flush the active lists and requests
- LP: #843904
  * Make TASKSTATS require root access, CVE-2011-2494
- LP: #866021
- CVE-2011-2494
  * proc: fix a race in do_io_accounting(), CVE-2011-2495
- LP: #866025
- CVE-2011-2495
  * drm/i915: Remove BUG_ON from i915_gem_evict_something
- LP: #828550
  * drm/i915: Hold a reference to the object whilst unbinding the eviction
list
- 

[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-10-25 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-mvl-dove - 2.6.32-219.37

---
linux-mvl-dove (2.6.32-219.37) lucid-proposed; urgency=low

  * Release Tracking Bug
- LP: #873062

  [ Paolo Pisati ]

  * Rebased to 2.6.32-35.78

  [ Ubuntu: 2.6.32-35.78 ]

  * Release Tracking Bug
- LP: #871899
  * SAUCE: sched: Prevent divide by zero when cpu_power is 0
- LP: #614853
  * [Config] Force perf to use libiberty for demangling
- LP: #783660
  * [Config] Simplify binary-udebs dependencies
- LP: #832352
  * [Config] kernel preparation cannot be parallelized
- LP: #832352
  * [Config] Linearize module/abi checks
- LP: #832352
  * [Config] Linearize and simplify tree preparation rules
- LP: #832352
  * [Config] Build kernel image in parallel with modules
- LP: #832352
  * [Config] Set concurrency for kmake invocations
- LP: #832352
  * [Config] Improve install-arch-headers speed
- LP: #832352
  * [Config] Fix binary-perarch dependencies
- LP: #832352
  * [Config] Removed stamp-flavours target
- LP: #832352
  * [Config] Serialize binary indep targets
- LP: #832352
  * [Config] Use build stamp directly
- LP: #832352
  * [Config] Restore prepare-% target
- LP: #832352
  * [Config] Fix binary-% build target
  * [Config] Fix install-headers target
- LP: #832352
  * SAUCE: igb: Protect stats update
- LP: #829566
  * SAUCE: rtl8192se spams log
- LP: #859702
  * Add mount option to check uid of device being mounted = expect uid,
CVE-2011-1833
- LP: #732628
- CVE-2011-1833
  * crypto: Move md5_transform to lib/md5.c
- LP: #827462
  * net: Compute protocol sequence numbers and fragment IDs using MD5.
- LP: #827462
  * ALSA: timer - Fix Oops at closing slave timer
- LP: #827462
  * ALSA: snd-usb-caiaq: Fix keymap for RigKontrol3
- LP: #827462
  * powerpc: Fix device tree claim code
- LP: #827462
  * powerpc: pseries: Fix kexec on machines with more than 4TB of RAM
- LP: #827462
  * Linux 2.6.32.45+drm33.19
- LP: #827462
  * ipv6: make fragment identifications less predictable, CVE-2011-2699
- LP: #827685
- CVE-2011-2699
  * tunnels: fix netns vs proto registration ordering
- LP: #823296
  * Fix broken backport for IPv6 tunnels in 2.6.32-longterm kernels.
  * USB: xhci: fix OS want to own HC
- LP: #837669
  * USB: assign instead of equal in usbtmc.c
- LP: #837669
  * USB: usb-storage: unusual_devs entry for ARM V2M motherboard.
- LP: #837669
  * USB: Serial: Added device ID for Qualcomm Modem in Sagemcom's HiLo3G
- LP: #837669
  * atm: br2864: sent packets truncated in VC routed mode
- LP: #837669
  * hwmon: (ibmaem) add missing kfree
- LP: #837669
  * ALSA: snd-usb-caiaq: Correct offset fields of outbound iso_frame_desc
- LP: #837669
  * mm: fix wrong vmap address calculations with odd NR_CPUS values
- LP: #837669
  * perf tools: do not look at ./config for configuration
- LP: #837669
  * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel
oops
- LP: #837669
  * befs: Validate length of long symbolic links.
- LP: #837669
  * ALSA: snd_usb_caiaq: track submitted output urbs
- LP: #837669
  * ALSA: ac97: Add HP Compaq dc5100 SFF(PT003AW) to Headphone Jack Sense
whitelist
- LP: #826081, #837669
  * futex: Fix regression with read only mappings
- LP: #837669
  * x86-32, vdso: On system call restart after SYSENTER, use int $0x80
- LP: #837669
  * x86, UV: Remove UV delay in starting slave cpus
- LP: #837669
  * drm/ttm: fix ttm_bo_add_ttm(user) failure path
- LP: #837669
  * fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
- LP: #837669
  * igb: Fix lack of flush after register write and before delay
- LP: #837669
  * Linux 2.6.32.46
- LP: #837669
  * cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191
- LP: #834135
- CVE-2011-3191
  * Bluetooth: Prevent buffer overflow in l2cap config request,
CVE-2011-2497
- LP: #838423
- CVE-2011-2497
  * core: Fix memory leak/corruption on VLAN GRO_DROP, CVE-2011-1576
- LP: #844361
- CVE-2011-1576
  * ext4: Fix max file size and logical block counting of extent format
file, CVE-2011-2695
- LP: #819574
- CVE-2011-2695
  * drm/i915: prepare for fair lru eviction
- LP: #843904
  * drm/i915: Move the eviction logic to its own file.
- LP: #843904
  * drm/i915: Implement fair lru eviction across both rings. (v2)
- LP: #843904
  * drm/i915: Maintain LRU order of inactive objects upon access by CPU
(v2)
- LP: #843904
  * drm/i915/evict: Ensure we completely cleanup on failure
- LP: #843904
  * drm/i915: Periodically flush the active lists and requests
- LP: #843904
  * Make TASKSTATS require root access, CVE-2011-2494
- LP: #866021
- CVE-2011-2494
  * proc: fix a race in do_io_accounting(), CVE-2011-2495
- LP: #866025
- CVE-2011-2495
  * drm/i915: Remove BUG_ON from 

[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-10-25 Thread Marc Deslauriers
** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-oneiric (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Maverick)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-oneiric (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Natty)
   Importance: Undecided = Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-10-24 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-mvl-dove - 2.6.32-419.37

---
linux-mvl-dove (2.6.32-419.37) maverick-proposed; urgency=low

  * Release Tracking Bug
- LP: #872659

  [ Paolo Pisati ]

  * Rebased to 2.6.32-35.78

  [ Ubuntu: 2.6.32-35.78 ]

  * Release Tracking Bug
- LP: #871899
  * SAUCE: sched: Prevent divide by zero when cpu_power is 0
- LP: #614853
  * [Config] Force perf to use libiberty for demangling
- LP: #783660
  * [Config] Simplify binary-udebs dependencies
- LP: #832352
  * [Config] kernel preparation cannot be parallelized
- LP: #832352
  * [Config] Linearize module/abi checks
- LP: #832352
  * [Config] Linearize and simplify tree preparation rules
- LP: #832352
  * [Config] Build kernel image in parallel with modules
- LP: #832352
  * [Config] Set concurrency for kmake invocations
- LP: #832352
  * [Config] Improve install-arch-headers speed
- LP: #832352
  * [Config] Fix binary-perarch dependencies
- LP: #832352
  * [Config] Removed stamp-flavours target
- LP: #832352
  * [Config] Serialize binary indep targets
- LP: #832352
  * [Config] Use build stamp directly
- LP: #832352
  * [Config] Restore prepare-% target
- LP: #832352
  * [Config] Fix binary-% build target
  * [Config] Fix install-headers target
- LP: #832352
  * SAUCE: igb: Protect stats update
- LP: #829566
  * SAUCE: rtl8192se spams log
- LP: #859702
  * Add mount option to check uid of device being mounted = expect uid,
CVE-2011-1833
- LP: #732628
- CVE-2011-1833
  * crypto: Move md5_transform to lib/md5.c
- LP: #827462
  * net: Compute protocol sequence numbers and fragment IDs using MD5.
- LP: #827462
  * ALSA: timer - Fix Oops at closing slave timer
- LP: #827462
  * ALSA: snd-usb-caiaq: Fix keymap for RigKontrol3
- LP: #827462
  * powerpc: Fix device tree claim code
- LP: #827462
  * powerpc: pseries: Fix kexec on machines with more than 4TB of RAM
- LP: #827462
  * Linux 2.6.32.45+drm33.19
- LP: #827462
  * ipv6: make fragment identifications less predictable, CVE-2011-2699
- LP: #827685
- CVE-2011-2699
  * tunnels: fix netns vs proto registration ordering
- LP: #823296
  * Fix broken backport for IPv6 tunnels in 2.6.32-longterm kernels.
  * USB: xhci: fix OS want to own HC
- LP: #837669
  * USB: assign instead of equal in usbtmc.c
- LP: #837669
  * USB: usb-storage: unusual_devs entry for ARM V2M motherboard.
- LP: #837669
  * USB: Serial: Added device ID for Qualcomm Modem in Sagemcom's HiLo3G
- LP: #837669
  * atm: br2864: sent packets truncated in VC routed mode
- LP: #837669
  * hwmon: (ibmaem) add missing kfree
- LP: #837669
  * ALSA: snd-usb-caiaq: Correct offset fields of outbound iso_frame_desc
- LP: #837669
  * mm: fix wrong vmap address calculations with odd NR_CPUS values
- LP: #837669
  * perf tools: do not look at ./config for configuration
- LP: #837669
  * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel
oops
- LP: #837669
  * befs: Validate length of long symbolic links.
- LP: #837669
  * ALSA: snd_usb_caiaq: track submitted output urbs
- LP: #837669
  * ALSA: ac97: Add HP Compaq dc5100 SFF(PT003AW) to Headphone Jack Sense
whitelist
- LP: #826081, #837669
  * futex: Fix regression with read only mappings
- LP: #837669
  * x86-32, vdso: On system call restart after SYSENTER, use int $0x80
- LP: #837669
  * x86, UV: Remove UV delay in starting slave cpus
- LP: #837669
  * drm/ttm: fix ttm_bo_add_ttm(user) failure path
- LP: #837669
  * fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
- LP: #837669
  * igb: Fix lack of flush after register write and before delay
- LP: #837669
  * Linux 2.6.32.46
- LP: #837669
  * cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191
- LP: #834135
- CVE-2011-3191
  * Bluetooth: Prevent buffer overflow in l2cap config request,
CVE-2011-2497
- LP: #838423
- CVE-2011-2497
  * core: Fix memory leak/corruption on VLAN GRO_DROP, CVE-2011-1576
- LP: #844361
- CVE-2011-1576
  * ext4: Fix max file size and logical block counting of extent format
file, CVE-2011-2695
- LP: #819574
- CVE-2011-2695
  * drm/i915: prepare for fair lru eviction
- LP: #843904
  * drm/i915: Move the eviction logic to its own file.
- LP: #843904
  * drm/i915: Implement fair lru eviction across both rings. (v2)
- LP: #843904
  * drm/i915: Maintain LRU order of inactive objects upon access by CPU
(v2)
- LP: #843904
  * drm/i915/evict: Ensure we completely cleanup on failure
- LP: #843904
  * drm/i915: Periodically flush the active lists and requests
- LP: #843904
  * Make TASKSTATS require root access, CVE-2011-2494
- LP: #866021
- CVE-2011-2494
  * proc: fix a race in do_io_accounting(), CVE-2011-2495
- LP: #866025
- CVE-2011-2495
  * drm/i915: Remove BUG_ON 

[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-10-20 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-proposed/linux-ec2

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-10-20 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-proposed/linux-mvl-dove

** Branch linked: lp:ubuntu/maverick-proposed/linux-mvl-dove

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-10-11 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.35-30.60

---
linux (2.6.35-30.60) maverick-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #854092

  [ Stefan Bader ]

  * [Config] Force perf to use libiberty for demangling
- LP: #783660

  [ Tim Gardner ]

  * [Config] Simplify binary-udebs dependencies
  * [Config] kernel preparation cannot be parallelized
  * [Config] Linearize module/abi checks
  * [Config] Linearize and simplify tree preparation rules
  * [Config] Build kernel image in parallel with modules
  * [Config] Set concurrency for kmake invocations
  * [Config] Improve install-arch-headers speed
  * [Config] Fix binary-perarch dependencies
  * [Config] Removed stamp-flavours target
  * [Config] Serialize binary indep targets
  * [Config] Use build stamp directly
  * [Config] Restore prepare-% target
  * [Config] Fix binary-% build target

  [ Upstream Kernel Changes ]

  * Add mount option to check uid of device being mounted = expect uid,
CVE-2011-1833
- LP: #732628
- CVE-2011-1833
  * ipv6: make fragment identifications less predictable, CVE-2011-2699
- LP: #827685
- CVE-2011-2699
  * perf: Fix software event overflow, CVE-2011-2918
- LP: #834121
- CVE-2011-2918
  * cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191
- LP: #834135
- CVE-2011-3191
  * befs: Validate length of long symbolic links, CVE-2011-2928
- LP: #834124
- CVE-2011-2928
  * gro: Only reset frag0 when skb can be pulled, CVE-2011-2723
- LP: #844371
- CVE-2011-2723
  * Validate size of EFI GUID partition entries, CVE-2011-1776
- LP: #844365
- CVE-2011-1776
  * inet_diag: fix inet_diag_bc_audit(), CVE-2011-2213
- LP: #838421
- CVE-2011-2213
  * si4713-i2c: avoid potential buffer overflow on si4713, CVE-2011-2700
- LP: #844370
- CVE-2011-2700
  * Bluetooth: Prevent buffer overflow in l2cap config request,
CVE-2011-2497
- LP: #838423
- CVE-2011-2497
  * core: Fix memory leak/corruption on VLAN GRO_DROP, CVE-2011-1576
- LP: #844361
- CVE-2011-1576
 -- Herton Ronaldo Krzesinski herton.krzesin...@canonical.com   Mon, 19 Sep 
2011 15:10:43 -0300

** Changed in: linux (Ubuntu Maverick)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-09-29 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-backport-maverick -
2.6.35-30.60~lucid1

---
linux-lts-backport-maverick (2.6.35-30.60~lucid1) lucid-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #854430

  [ Stefan Bader ]

  * [Config] Force perf to use libiberty for demangling
- LP: #783660

  [ Tim Gardner ]

  * [Config] Simplify binary-udebs dependencies
  * [Config] kernel preparation cannot be parallelized
  * [Config] Linearize module/abi checks
  * [Config] Linearize and simplify tree preparation rules
  * [Config] Build kernel image in parallel with modules
  * [Config] Set concurrency for kmake invocations
  * [Config] Improve install-arch-headers speed
  * [Config] Fix binary-perarch dependencies
  * [Config] Removed stamp-flavours target
  * [Config] Serialize binary indep targets
  * [Config] Use build stamp directly
  * [Config] Restore prepare-% target
  * [Config] Fix binary-% build target

  [ Upstream Kernel Changes ]

  * Add mount option to check uid of device being mounted = expect uid,
CVE-2011-1833
- LP: #732628
- CVE-2011-1833
  * ipv6: make fragment identifications less predictable, CVE-2011-2699
- LP: #827685
- CVE-2011-2699
  * perf: Fix software event overflow, CVE-2011-2918
- LP: #834121
- CVE-2011-2918
  * cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191
- LP: #834135
- CVE-2011-3191
  * befs: Validate length of long symbolic links, CVE-2011-2928
- LP: #834124
- CVE-2011-2928
  * gro: Only reset frag0 when skb can be pulled, CVE-2011-2723
- LP: #844371
- CVE-2011-2723
  * Validate size of EFI GUID partition entries, CVE-2011-1776
- LP: #844365
- CVE-2011-1776
  * inet_diag: fix inet_diag_bc_audit(), CVE-2011-2213
- LP: #838421
- CVE-2011-2213
  * si4713-i2c: avoid potential buffer overflow on si4713, CVE-2011-2700
- LP: #844370
- CVE-2011-2700
  * Bluetooth: Prevent buffer overflow in l2cap config request,
CVE-2011-2497
- LP: #838423
- CVE-2011-2497
  * core: Fix memory leak/corruption on VLAN GRO_DROP, CVE-2011-1576
- LP: #844361
- CVE-2011-1576

linux (2.6.35-30.59) maverick-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #837449

  [ Upstream Kernel Changes ]

  * Revert drm/nv50-nvc0: work around an evo channel hang that some people
see
  * Revert eCryptfs: Handle failed metadata read in lookup
 -- Herton Ronaldo Krzesinski herton.krzesin...@canonical.com   Tue, 20 Sep 
2011 11:03:51 -0300

** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1576

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1776

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2213

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2497

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2700

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2723

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2928

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3191

** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-09-29 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-backport-natty -
2.6.38-11.50~lucid1

---
linux-lts-backport-natty (2.6.38-11.50~lucid1) lucid-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #848588

  [ Upstream Kernel Changes ]

  * Revert eCryptfs: Handle failed metadata read in lookup
  * Revert KVM: fix kvmclock regression due to missing clock update
  * Revert ath9k: use split rx buffers to get rid of order-1 skb
allocations

linux (2.6.38-11.49) natty-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #836903

  [ Adam Jackson ]

  * SAUCE: drm/i915/pch: Fix integer math bugs in panel fitting
- LP: #753994

  [ Keng-Yu Lin ]

  * SAUCE: Input: ALPS - Enable Intellimouse mode for Lenovo Zhaoyang E47
- LP: #632884, #803005

  [ Stefan Bader ]

  * [Config] Force perf to use libiberty for demangling
- LP: #783660

  [ Tim Gardner ]

  * [Config] Add enic/fnic to udebs
- LP: #801610

  [ Upstream Kernel Changes ]

  * eeepc-wmi: add keys found on EeePC 1215T
- LP: #812644
  * eCryptfs: Handle failed metadata read in lookup
- LP: #509180
  * pagemap: close races with suid execve, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * report errors in /proc/*/*map* sanely, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * close race in /proc/*/environ, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * auxv: require the target to be tracable (or yourself), CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * deal with races in /proc/*/{syscall, stack, personality}, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * vmscan: fix a livelock in kswapd
- LP: #813797
  * mmc: Add PCI fixup quirks for Ricoh 1180:e823 reader
- LP: #773524
  * mmc: Added quirks for Ricoh 1180:e823 lower base clock frequency
- LP: #773524
  * rose: Add length checks to CALL_REQUEST parsing, CVE-2011-1493
- LP: #816550
- CVE-2011-1493
  * pata_marvell: Add support for 88SE91A0, 88SE91A4
- LP: #777325
  * GFS2: make sure fallocate bytes is a multiple of blksize, CVE-2011-2689
- LP: #819572
- CVE-2011-2689
  * Bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace.
- LP: #819569
- CVE-2011-2492
  * drm/nv50-nvc0: work around an evo channel hang that some people see
- LP: #583760
  * KVM: fix kvmclock regression due to missing clock update
- LP: #795717
  * Add mount option to check uid of device being mounted = expect uid,
CVE-2011-1833
- LP: #732628
- CVE-2011-1833
  * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * ipv6: make fragment identifications less predictable, CVE-2011-2699
- LP: #827685
- CVE-2011-2699
  * ath9k: use split rx buffers to get rid of order-1 skb allocations
- LP: #728835
  * perf: Fix software event overflow, CVE-2011-2918
- LP: #834121
- CVE-2011-2918

linux (2.6.38-11.48) natty-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #818175

  [ Upstream Kernel Changes ]

  * Revert HID: magicmouse: ignore 'ivalid report id' while switching
modes
- LP: #814250

linux (2.6.38-11.47) natty-proposed; urgency=low

  [Steve Conklin]

  * Release Tracking Bug
- LP: #811180

  [ Keng-Yu Lin ]

  * SAUCE: Revert: dell-laptop: Toggle the unsupported hardware
killswitch
- LP: #775281

  [ Ming Lei ]

  * SAUCE: fix yama_ptracer_del lockdep warning
- LP: #791019

  [ Stefan Bader ]

  * SAUCE: Re-enable RODATA for i386 virtual
- LP: #809838

  [ Tim Gardner ]

  * [Config] Add grub-efi as a recommended bootloader for server and
generic
- LP: #800910
  * SAUCE: rtl8192se: Force a build for a 2.6/3.0 kernel
- LP: #805494

  [ Upstream Kernel Changes ]

  * Revert bridge: Forward reserved group addresses if !STP
- LP: #793702
  * Fix up ABI directory
  * bonding: Incorrect TX queue offset, CVE-2011-1581
- LP: #792312
- CVE-2011-1581
  * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel
oops
- LP: #795418
- CVE-2011-1577
  * usbnet/cdc_ncm: add missing .reset_resume hook
- LP: #793892
  * ath5k: Disable fast channel switching by default
- LP: #767192
  * mm: vmscan: correctly check if reclaimer should schedule during
shrink_slab
- LP: #755066
  * mm: vmscan: correct use of pgdat_balanced in sleeping_prematurely
- LP: #755066
  * ALSA: hda - Use LPIB for ATI/AMD chipsets as default
- LP: #741825
  * ALSA: hda - Enable snoop bit for AMD controllers
- LP: #741825
  * ALSA: hda - Enable sync_write workaround for AMD generically
- LP: #741825
  * cpuidle: menu: fixed wrapping timers at 4.294 seconds
- LP: #774947
  * drm/i915: Fix gen6 (SNB) missed BLT ring interrupts.
- LP: #761065
  * USB: ehci: remove structure packing from ehci_def
- LP: #791552
  * drm/i915: disable PCH ports if needed when disabling a 

[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-09-22 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-maverick

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-09-21 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 2.6.38-1209.15

---
linux-ti-omap4 (2.6.38-1209.15) natty-proposed; urgency=low

  * Release tracking bug
- LP: #837761

  [ Paolo Pisati ]

  * [Config] Turn on CONFIG_USER_NS and DEVPTS_MULTIPLE_INSTANCES.
- LP: #787749

  [ Tim Gardner ]

  * [Config] Add enic/fnic to nic-modules udeb, CVE-2011-1020
- LP: #801610

  [ Upstream Kernel Changes ]

  * mpt2sas: prevent heap overflows and unchecked reads
- LP: #780546
  * agp: fix arbitrary kernel memory writes
- LP: #775809
  * can: add missing socket check in can/raw release
- LP: #780546
  * agp: fix OOM and buffer overflow
- LP: #775809
  * bonding: Incorrect TX queue offset, CVE-2011-1581
- LP: #792312
- CVE-2011-1581
  * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel
oops
- LP: #795418
- CVE-2011-1577
  * can: Add missing socket check in can/bcm release.
- LP: #796502
- CVE-2011-1598
  * USB: ehci: remove structure packing from ehci_def
- LP: #791552
  * taskstats: don't allow duplicate entries in listener mode,
CVE-2011-2484
- LP: #806390
- CVE-2011-2484
  * ext4: init timer earlier to avoid a kernel panic in __save_error_info,
CVE-2011-2493
- LP: #806929
- CVE-2011-2493
  * dccp: handle invalid feature options length, CVE-2011-1770
- LP: #806375
- CVE-2011-1770
  * pagemap: close races with suid execve, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * report errors in /proc/*/*map* sanely, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * close race in /proc/*/environ, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * auxv: require the target to be tracable (or yourself), CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * deal with races in /proc/*/{syscall, stack, personality}, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * rose: Add length checks to CALL_REQUEST parsing, CVE-2011-1493
- LP: #816550
- CVE-2011-1493
  * GFS2: make sure fallocate bytes is a multiple of blksize, CVE-2011-2689
- LP: #819572
- CVE-2011-2689
  * Bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace.
- LP: #819569
- CVE-2011-2492
  * Add mount option to check uid of device being mounted = expect uid,
CVE-2011-1833
- LP: #732628
- CVE-2011-1833
  * ipv6: make fragment identifications less predictable, CVE-2011-2699
- LP: #827685
- CVE-2011-2699
  * perf: Fix software event overflow, CVE-2011-2918
- LP: #834121
- CVE-2011-2918
  * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020
- LP: #813026
- CVE-2011-1020

linux-ti-omap4 (2.6.38-1209.13) natty; urgency=low

  [ Tim Gardner ]

  * Release Tracking Bug
- LP: #772381

  [ Brad Figg ]

  * Ubuntu-2.6.38-9.43

  [ Bryan Wu ]

  * merge Ubuntu-2.6.38-9.43
  * cherry-pick 6 patches from u2 of 'for-ubuntu' branch
  * [Config] Sync up configs for 2.6.38.4

  [ Herton Ronaldo Krzesinski ]

  * SAUCE: Revert x86, hibernate: Initialize mmu_cr4_features during boot
- LP: #764758

  [ Leann Ogasawara ]

  * [Config] updateconfigs for 2.6.38.4

  [ Paolo Pisati ]

  * [Config] s/USB_MUSB_TUSB6010/USB_MUSB_OMAP2PLUS/ on omap3 to get musb
- LP: #759913

  [ Serge E. Hallyn ]

  * SAUCE: kvm: fix push of wrong eip when doing softint
- LP: #747090

  [ Tim Gardner ]

  * [Config] Add cachefiles.ko to virtual flavour
- LP: #770430

  [ Upstream Kernel Changes ]

  * Revert net/sunrpc: Use static const char arrays
- LP: #761134
  * Revert x86: Cleanup highmap after brk is concluded
- LP: #761134
  * ALSA: hda - Fix SPDIF out regression on ALC889
- LP: #761134
  * ALSA: Fix yet another race in disconnection
- LP: #761134
  * ALSA: vmalloc buffers should use normal mmap
- LP: #761134
  * perf: Better fit max unprivileged mlock pages for tools needs
- LP: #761134
  * myri10ge: fix rmmod crash
- LP: #761134
  * cciss: fix lost command issue
- LP: #761134
  * ath9k: Fix kernel panic in AR2427
- LP: #761134
  * sound/oss/opl3: validate voice and channel indexes
- LP: #761134
  * mac80211: initialize sta-last_rx in sta_info_alloc
- LP: #761134
  * ses: show devices for enclosures with no page 7
- LP: #761134
  * ses: Avoid kernel panic when lun 0 is not mapped
- LP: #761134
  * PCI/ACPI: Report ASPM support to BIOS if not disabled from command line
- LP: #761134
  * eCryptfs: Unlock page in write_begin error path
- LP: #761134
  * eCryptfs: ecryptfs_keyring_auth_tok_for_sig() bug fix
- LP: #761134
  * crypto: aesni-intel - fixed problem with packets that are not multiple
of 64bytes
- LP: #761134
  * staging: usbip: bugfixes related to kthread conversion
- LP: #761134
  * staging: usbip: bugfix add number of packets for isochronous frames
- LP: #761134
  * staging: usbip: bugfix for isochronous packets and optimization
- LP: #761134
  * staging: hv: use 

[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-09-21 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.38-11.50

---
linux (2.6.38-11.50) natty-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #848246

  [ Upstream Kernel Changes ]

  * Revert eCryptfs: Handle failed metadata read in lookup
  * Revert KVM: fix kvmclock regression due to missing clock update
  * Revert ath9k: use split rx buffers to get rid of order-1 skb
allocations

linux (2.6.38-11.49) natty-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #836903

  [ Adam Jackson ]

  * SAUCE: drm/i915/pch: Fix integer math bugs in panel fitting
- LP: #753994

  [ Keng-Yu Lin ]

  * SAUCE: Input: ALPS - Enable Intellimouse mode for Lenovo Zhaoyang E47
- LP: #632884, #803005

  [ Stefan Bader ]

  * [Config] Force perf to use libiberty for demangling
- LP: #783660

  [ Tim Gardner ]

  * [Config] Add enic/fnic to udebs
- LP: #801610

  [ Upstream Kernel Changes ]

  * eeepc-wmi: add keys found on EeePC 1215T
- LP: #812644
  * eCryptfs: Handle failed metadata read in lookup
- LP: #509180
  * pagemap: close races with suid execve, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * report errors in /proc/*/*map* sanely, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * close race in /proc/*/environ, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * auxv: require the target to be tracable (or yourself), CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * deal with races in /proc/*/{syscall, stack, personality}, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * vmscan: fix a livelock in kswapd
- LP: #813797
  * mmc: Add PCI fixup quirks for Ricoh 1180:e823 reader
- LP: #773524
  * mmc: Added quirks for Ricoh 1180:e823 lower base clock frequency
- LP: #773524
  * rose: Add length checks to CALL_REQUEST parsing, CVE-2011-1493
- LP: #816550
- CVE-2011-1493
  * pata_marvell: Add support for 88SE91A0, 88SE91A4
- LP: #777325
  * GFS2: make sure fallocate bytes is a multiple of blksize, CVE-2011-2689
- LP: #819572
- CVE-2011-2689
  * Bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace.
- LP: #819569
- CVE-2011-2492
  * drm/nv50-nvc0: work around an evo channel hang that some people see
- LP: #583760
  * KVM: fix kvmclock regression due to missing clock update
- LP: #795717
  * Add mount option to check uid of device being mounted = expect uid,
CVE-2011-1833
- LP: #732628
- CVE-2011-1833
  * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * ipv6: make fragment identifications less predictable, CVE-2011-2699
- LP: #827685
- CVE-2011-2699
  * ath9k: use split rx buffers to get rid of order-1 skb allocations
- LP: #728835
  * perf: Fix software event overflow, CVE-2011-2918
- LP: #834121
- CVE-2011-2918
 -- Herton Ronaldo Krzesinski herton.krzesin...@canonical.com   Mon, 12 Sep 
2011 17:23:38 -0300

** Changed in: linux (Ubuntu Natty)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-09-21 Thread Jamie Strandboge
Debian now has 92-2, which is not affected.

** Changed in: ecryptfs-utils (Debian)
   Status: New = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-09-21 Thread Jamie Strandboge
This was fixed in Fedora: http://pkgs.fedoraproject.org/gitweb/?p
=ecryptfs-utils.git

** Bug watch added: Red Hat Bugzilla #729465
   https://bugzilla.redhat.com/show_bug.cgi?id=729465

** Package changed: ecryptfs-utils (Fedora) = fedora

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-09-21 Thread Jamie Strandboge
Red Hat Bugzilla #729465

** Changed in: fedora
   Status: New = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-09-20 Thread Andy Whitcroft
** Changed in: linux-qcm-msm (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-qcm-msm (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-qcm-msm (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-qcm-msm (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-qcm-msm (Ubuntu Oneiric)
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-09-13 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-fsl-imx51 - 2.6.31-610.28

---
linux-fsl-imx51 (2.6.31-610.28) lucid-proposed; urgency=low

  * Release tracking bug
- LP: #837802

  [ Upstream Kernel Changes ]

  * ipv6: make fragment identifications less predictable, CVE-2011-2699
- LP: #827685
- CVE-2011-2699
  * perf: Fix software event overflow, CVE-2011-2918
- LP: #834121
- CVE-2011-2918
  * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020
- LP: #813026
- CVE-2011-1020

linux-fsl-imx51 (2.6.31-610.27) lucid-proposed; urgency=low

  * Release tracking bug
- LP: #829160

  [ Upstream Kernel Changes ]

  * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel
oops
- LP: #795418
- CVE-2011-1577
  * Fix corrupted OSF partition table parsing
- LP: #796606
- CVE-2011-1163
  * can: Add missing socket check in can/bcm release.
- LP: #796502
- CVE-2011-1598
  * proc: protect mm start_code/end_code in /proc/pid/stat
- LP: #799906
- CVE-2011-0726
  * sctp: Fix a race between ICMP protocol unreachable and connect()
  * tty: Make tiocgicount a handler, CVE-2010-4076, CVE-2010-4077
- LP: #794034
- CVE-2010-4077
  * filter: make sure filters dont read uninitialized memory CVE-2010-4158
- LP: #721282
- CVE-2010-4158
  * bio: take care not overflow page count when mapping/copying user data
CVE-2010-4162
- LP: #721441
- CVE-2010-4162
  * block: check for proper length of iov entries in blk_rq_map_user_iov()
- LP: #721504
- CVE-2010-4163
  * block: check for proper length of iov entries earlier in
blk_rq_map_user_iov(), CVE-2010-4163
- LP: #721504
- CVE-2010-4163
  * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175
- LP: #721455
- CVE-2010-4175
  * bluetooth: Fix missing NULL check CVE-2010-4242
- LP: #714846
- CVE-2010-4242
  * IB/uverbs: Handle large number of entries in poll CQ CVE-2010-4649
- LP: #800121
- CVE-2010-4649
  * epoll: prevent creating circular epoll structures CVE-2011-1082
- LP: #800758
- CVE-2011-1082
  * nfs4: Ensure that ACL pages sent over NFS were not allocated from the
slab (v3) CVE-2011-1090
- LP: #800775
  * ldm: corrupted partition table can cause kernel oops CVE-2011-1012
- LP: #801083
- CVE-2011-1012
  * netfilter: ipt_CLUSTERIP: fix buffer overflow CVE-2011-2534
- LP: #801473
- CVE-2011-2534
  * netfilter: arp_tables: fix infoleak to userspace CVE-2011-1170
- LP: #801480
- CVE-2011-1170
  * netfilter: ip_tables: fix infoleak to userspace CVE-2011-1171
- LP: #801482
- CVE-2011-1171
  * ipv6: netfilter: ip6_tables: fix infoleak to userspace CVE-2011-1172
- LP: #801483
- CVE-2011-1172
  * econet: 4 byte infoleak to the network CVE-2011-1173
- LP: #801484
- CVE-2011-1173
  * net: Limit socket I/O iovec total length to INT_MAX.
- LP: #708839
  * fs/partitions: Validate map_count in Mac partition tables -
CVE-2011-1010
- LP: #804225
- CVE-2011-1010
  * drm: fix unsigned vs signed comparison issue in modeset ctl ioctl,
CVE-2011-1013
- LP: #804229
- CVE-2011-1013
  * exec: copy-and-paste the fixes into compat_do_execve() paths -
CVE-2010-4243
- LP: #804234
- CVE-2010-4243
  * taskstats: don't allow duplicate entries in listener mode,
CVE-2011-2484
- LP: #806390
- CVE-2011-2484
  * dccp: handle invalid feature options length, CVE-2011-1770
- LP: #806375
- CVE-2011-1770
  * pagemap: close races with suid execve, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * report errors in /proc/*/*map* sanely, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * close race in /proc/*/environ, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * auxv: require the target to be tracable (or yourself), CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * deal with races in /proc/*/{syscall, stack, personality}, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * dccp: fix oops on Reset after close, CVE-2011-1093
- LP: #814087
- CVE-2011-1093
  * net: add limit for socket backlog CVE-2010-4251
- LP: #807462
  * tcp: use limited socket backlog CVE-2010-4251
- LP: #807462
  * ipv6: udp: Optimise multicast reception
- LP: #807462
  * ipv4: udp: Optimise multicast reception
- LP: #807462
  * udp: multicast RX should increment SNMP/sk_drops counter in allocation
failures CVE-2010-4251
- LP: #807462
  * udp: use limited socket backlog CVE-2010-4251
- LP: #807462
  * llc: use limited socket backlog CVE-2010-4251
- LP: #807462
  * sctp: use limited socket backlog CVE-2010-4251
- LP: #807462
  * tipc: use limited socket backlog CVE-2010-4251
- LP: #807462
  * x25: use limited socket backlog CVE-2010-4251
- LP: #807462
  * net: backlog functions rename CVE-2010-4251
- LP: #807462
  * net: sk_add_backlog() take rmem_alloc into account CVE-2010-4805

[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-09-13 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24

---
linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low

  * Release tracking bug
- LP: #838037

  [ Upstream Kernel Changes ]

  * ipv6: make fragment identifications less predictable, CVE-2011-2699
- LP: #827685
- CVE-2011-2699
  * perf: Fix software event overflow, CVE-2011-2918
- LP: #834121
- CVE-2011-2918
  * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020
- LP: #813026
- CVE-2011-1020

linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low

  * Release tracking bug
- LP: #829655

  [ Upstream Kernel Changes ]

  * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016
- LP: #745686
- CVE-2011-1016
  * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016
- LP: #745686
- CVE-2011-1016
  * can-bcm: fix minor heap overflow
- LP: #690730
  * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565
- LP: #765007
- CVE-2010-4565
  * av7110: check for negative array offset
- LP: #747520
  * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1,
CVE-2011-0711
- LP: #767740
- CVE-2011-0711
  * ALSA: caiaq - Fix possible string-buffer overflow
- LP: #747520
  * IB/cm: Bump reference count on cm_id before invoking callback,
CVE-2011-0695
- LP: #770369
- CVE-2011-0695
  * RDMA/cma: Fix crash in request handlers, CVE-2011-0695
- LP: #770369
- CVE-2011-0695
  * Treat writes as new when holes span across page boundaries,
CVE-2011-0463
- LP: #770483
- CVE-2011-0463
  * net: clear heap allocations for privileged ethtool actions
- LP: #686158
  * usb: iowarrior: don't trust report_size for buffer size
- LP: #747520
  * fs/partitions/ldm.c: fix oops caused by corrupted partition table,
CVE-2011-1017
- LP: #771382
- CVE-2011-1017
  * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal
code
- LP: #747520
  * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo
- LP: #747520
  * exec: make argv/envp memory visible to oom-killer
- LP: #690730
  * next_pidmap: fix overflow condition
- LP: #772560
  * proc: do proper range check on readdir offset
- LP: #772560
  * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169
- LP: #785331
- CVE-2011-1169
  * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494
- LP: #787145
- CVE-2011-1494
  * agp: fix arbitrary kernel memory writes, CVE-1011-2022
- LP: #788684
- CVE-1011-2022
  * can: add missing socket check in can/raw release, CVE-2011-1748
- LP: #788694
- CVE-2011-1748
  * agp: fix OOM and buffer overflow
- LP: #788700
  * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack
memory - CVE-2010-3296
- CVE-2010-3296
  * drivers/net/eql.c: prevent reading uninitialized stack memory -
CVE-2010-3297
- CVE-2010-3297
  * inet_diag: Make sure we actually run the same bytecode we audited,
CVE-2010-3880
- LP: #711865
- CVE-2010-3880
  * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858
- LP: #672664
- CVE-2010-3858
  * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859
- LP: #690730
- CVE-2010-3859
  * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859
- LP: #690730
- CVE-2010-3859
  * ipc: initialize structure memory to zero for compat functions -
CVE-2010-4073
- LP: #690730
- CVE-2010-4073
  * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory -
CVE-2010-4080, CVE-2010-4081
- LP: #672664
- CVE-2010-4080, CVE-2010-4081
  * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory -
CVE-2010-4082
- CVE-2010-4082
  * sys_semctl: fix kernel stack leakage, CVE-2010-4083
- LP: #712749
- CVE-2010-4083
  * gdth: integer overflow in ioctl - CVE-2010-4157
- LP: #686158
- CVE-2010-4157
  * bio: take care not overflow page count when mapping/copying user data -
CVE-2010-4162
- LP: #721441
- CVE-2010-4162
  * bluetooth: Fix missing NULL check - CVE-2010-4242
- LP: #686158
  * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175
- LP: #721455
- CVE-2010-4175
  * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169
- LP: #690730
- CVE-2010-4169
  * block: check for proper length of iov entries in blk_rq_map_user_iov()
- CVE-2010-4163
- LP: #690730
- CVE-2010-4163
  * block: check for proper length of iov entries earlier in
blk_rq_map_user_iov(), CVE-2010-4163
- LP: #721504
- CVE-2010-4163
  * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel
oops
- LP: #795418
- CVE-2011-1577
  * Fix corrupted OSF partition table parsing
- LP: #796606
- CVE-2011-1163
  * can: Add missing socket check in 

[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-09-13 Thread Ubuntu QA's Bug Bot
The attachment Fixes mountpoint races and mtab handling of this bug
report has been identified as being a patch.  The ubuntu-reviewers team
has been subscribed to the bug report so that they can review the patch.
In the event that this is in fact not a patch you can resolve this
situation by removing the tag 'patch' from the bug report and editing
the attachment so that it is not flagged as a patch.  Additionally, if
you are member of the ubuntu-sponsors please also unsubscribe the team
from this bug report.

[This is an automated message performed by a Launchpad user owned by
Brian Murray.  Please contact him regarding any issues with the action
taken in this bug report.]

** Tags added: patch

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-09-01 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-natty

** Branch linked: lp:ubuntu/natty-proposed/linux-ti-omap4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-09-01 Thread Dustin Kirkland
** Changed in: ecryptfs-utils (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: ecryptfs
   Status: Triaged = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-08-31 Thread Herton R. Krzesinski
** Tags added: kernel-cve-tracking-bug

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-08-24 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/maverick-proposed/linux-ti-omap4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-08-16 Thread Kees Cook
** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: New = Fix Committed

** Changed in: linux-ec2 (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-ec2 (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux-ec2 (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux-ec2 (Ubuntu Maverick)
   Importance: Undecided = Low

** Changed in: linux-ec2 (Ubuntu Natty)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: New = Fix Committed

** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-natty (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-natty (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-natty (Ubuntu Maverick)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-natty (Ubuntu Natty)
   Importance: Undecided = Low

** Changed in: linux-mvl-dove (Ubuntu Lucid)
   Status: New = Fix Committed

** Changed in: linux-mvl-dove (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-mvl-dove (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux-mvl-dove (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux-mvl-dove (Ubuntu Maverick)
   Status: New = Fix Committed

** Changed in: linux-mvl-dove (Ubuntu Maverick)
   Importance: Undecided = Low

** Changed in: linux-mvl-dove (Ubuntu Natty)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
   Status: New = Fix Committed

** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-maverick (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-maverick (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-maverick (Ubuntu Maverick)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-maverick (Ubuntu Natty)
   Importance: Undecided = Low

** Changed in: linux (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux (Ubuntu Maverick)
   Importance: Undecided = Low

** Changed in: linux (Ubuntu Natty)
   Importance: Undecided = Low

** Changed in: linux-ti-omap4 (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-ti-omap4 (Ubuntu Oneiric)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux-ti-omap4 (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux-ti-omap4 (Ubuntu Maverick)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Maverick)
   Importance: Undecided = Low

** Changed in: linux-ti-omap4 (Ubuntu Natty)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Natty)
   Importance: Undecided = Low

** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
   Status: New = Fix Committed

** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-fsl-imx51 (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux-fsl-imx51 (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux-fsl-imx51 (Ubuntu Maverick)
   Importance: Undecided = Low

** Changed in: linux-fsl-imx51 (Ubuntu Natty)
   Importance: Undecided = Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-08-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.0.0-8.11

---
linux (3.0.0-8.11) oneiric; urgency=low

  [ Andy Whitcroft ]

  * [Config] Enable CONFIG_MACVTAP=m
- LP: #822601

  [ Colin Watson ]

  * Deliver more Atheros, Ralink, and iwlagn NIC drivers to d-i

  [ Stefan Bader ]

  * (config) Package macvlan and macvtap for virtual

  [ Tim Gardner ]

  * [Config] Clean up tools rules
  * [Config] Package x86_energy_perf_policy and turbostat
- LP: #797556

  [ Upstream Kernel Changes ]

  * dell-wmi: Add keys for Dell XPS L502X
- LP: #815914
  * hfsplus: ensure bio requests are not smaller than the hardware sectors
- LP: #734883
  * Ecryptfs: Add mount option to check uid of device being mounted =
expect uid
- LP: #732628
- CVE-2011-1833
  * ideapad: define cfg bits and create sysfs node for cfg
  * ideapad: let camera_power node invisiable if no camera
  * ideapad: add backlight driver
  * ideapad: add missing ideapad_input_exit in ideapad_acpi_add error path
  * eCryptfs: Fix payload_len unitialized variable warning
  * eCryptfs: fix compile error
  * eCryptfs: Return error when lower file pointer is NULL
  * mac80211: be more careful in suspend/resume
- LP: #811214
 -- Leann Ogasawara leann.ogasaw...@canonical.com   Mon, 08 Aug 2011 06:23:16 
-0700

** Changed in: linux (Ubuntu Oneiric)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-08-11 Thread Tim Gardner
** Changed in: linux (Ubuntu Lucid)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux (Ubuntu Maverick)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu Natty)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu Oneiric)
   Status: New = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-08-10 Thread Kees Cook
** Also affects: ecryptfs-utils (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-source-2.6.15 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Changed in: linux-ec2 (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-ti-omap4 (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-ti-omap4 (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Natty)
   Status: New = Invalid

** Description changed:

  check_ownerships() function doesn't work as it should because of a race
- condition.  Arguments of both mount() and umount() calls can be changed
- between the check and the usage.  This may lead to arbitrary mount point
+ condition. Arguments of both mount() and umount() calls can be changed
+ between the check and the usage. This may lead to arbitrary mount point
  umounting or probably to gaining ability to try passphrases of
- otherpeople's ecryptfs storages.
+ otherpeople's ecryptfs storages. lock_counter() is also racy. It (1)
+ tries to check existance and ownership of the file before open(), (2)
+ neither use stat() instead of lstat() nor O_NOFOLLOW, (3) is not
+ protected against deletion of the lock file by the owner. The lock file
+ should be probably created in root only writable directory before
+ dropping EUID.
  
- lock_counter() is also racy.  It (1) tries to check existance and
- ownership of the file before open(), (2) neither use stat() instead of
- lstat() nor O_NOFOLLOW, (3) is not protected against deletion of the
- lock file by the owner. The lock file should be probably created in root
- only writable directory before dropping EUID.
+ Introduced-by: 237fead619984cc48818fe12ee0ceada3f55b012
+ Fixed-by: 764355487ea220fdc2faf128d577d7f679b91f97

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-08-10 Thread Kees Cook
** Changed in: linux-ti-omap (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-source-2.6.15 (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-source-2.6.15 (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-source-2.6.15 (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-source-2.6.15 (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-source-2.6.15 (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-ti-omap (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-ti-omap (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-ti-omap (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-ti-omap (Ubuntu Oneiric)
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-08-10 Thread Kees Cook
** Description changed:

  check_ownerships() function doesn't work as it should because of a race
  condition. Arguments of both mount() and umount() calls can be changed
  between the check and the usage. This may lead to arbitrary mount point
  umounting or probably to gaining ability to try passphrases of
  otherpeople's ecryptfs storages. lock_counter() is also racy. It (1)
  tries to check existance and ownership of the file before open(), (2)
  neither use stat() instead of lstat() nor O_NOFOLLOW, (3) is not
  protected against deletion of the lock file by the owner. The lock file
  should be probably created in root only writable directory before
  dropping EUID.
  
- Introduced-by: 237fead619984cc48818fe12ee0ceada3f55b012
- Fixed-by: 764355487ea220fdc2faf128d577d7f679b91f97
+ Break-Fix: 237fead619984cc48818fe12ee0ceada3f55b012
+ 764355487ea220fdc2faf128d577d7f679b91f97

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 732628] Re: TOCTOU in mount.ecryptfs_private

2011-08-09 Thread Marc Deslauriers
** Visibility changed to: Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/732628

Title:
  TOCTOU in mount.ecryptfs_private

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs