[Bug 801483] Re: CVE-2011-1172

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/801483

Title:
  CVE-2011-1172

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/801483/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 801483] Re: CVE-2011-1172

2013-05-21 Thread Jamie Strandboge
** Changed in: linux-ti-omap4 (Ubuntu Natty)
   Status: Fix Committed = Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/801483

Title:
  CVE-2011-1172

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/801483/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 801483] Re: CVE-2011-1172

2011-09-13 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-fsl-imx51 - 2.6.31-610.28

---
linux-fsl-imx51 (2.6.31-610.28) lucid-proposed; urgency=low

  * Release tracking bug
- LP: #837802

  [ Upstream Kernel Changes ]

  * ipv6: make fragment identifications less predictable, CVE-2011-2699
- LP: #827685
- CVE-2011-2699
  * perf: Fix software event overflow, CVE-2011-2918
- LP: #834121
- CVE-2011-2918
  * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020
- LP: #813026
- CVE-2011-1020

linux-fsl-imx51 (2.6.31-610.27) lucid-proposed; urgency=low

  * Release tracking bug
- LP: #829160

  [ Upstream Kernel Changes ]

  * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel
oops
- LP: #795418
- CVE-2011-1577
  * Fix corrupted OSF partition table parsing
- LP: #796606
- CVE-2011-1163
  * can: Add missing socket check in can/bcm release.
- LP: #796502
- CVE-2011-1598
  * proc: protect mm start_code/end_code in /proc/pid/stat
- LP: #799906
- CVE-2011-0726
  * sctp: Fix a race between ICMP protocol unreachable and connect()
  * tty: Make tiocgicount a handler, CVE-2010-4076, CVE-2010-4077
- LP: #794034
- CVE-2010-4077
  * filter: make sure filters dont read uninitialized memory CVE-2010-4158
- LP: #721282
- CVE-2010-4158
  * bio: take care not overflow page count when mapping/copying user data
CVE-2010-4162
- LP: #721441
- CVE-2010-4162
  * block: check for proper length of iov entries in blk_rq_map_user_iov()
- LP: #721504
- CVE-2010-4163
  * block: check for proper length of iov entries earlier in
blk_rq_map_user_iov(), CVE-2010-4163
- LP: #721504
- CVE-2010-4163
  * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175
- LP: #721455
- CVE-2010-4175
  * bluetooth: Fix missing NULL check CVE-2010-4242
- LP: #714846
- CVE-2010-4242
  * IB/uverbs: Handle large number of entries in poll CQ CVE-2010-4649
- LP: #800121
- CVE-2010-4649
  * epoll: prevent creating circular epoll structures CVE-2011-1082
- LP: #800758
- CVE-2011-1082
  * nfs4: Ensure that ACL pages sent over NFS were not allocated from the
slab (v3) CVE-2011-1090
- LP: #800775
  * ldm: corrupted partition table can cause kernel oops CVE-2011-1012
- LP: #801083
- CVE-2011-1012
  * netfilter: ipt_CLUSTERIP: fix buffer overflow CVE-2011-2534
- LP: #801473
- CVE-2011-2534
  * netfilter: arp_tables: fix infoleak to userspace CVE-2011-1170
- LP: #801480
- CVE-2011-1170
  * netfilter: ip_tables: fix infoleak to userspace CVE-2011-1171
- LP: #801482
- CVE-2011-1171
  * ipv6: netfilter: ip6_tables: fix infoleak to userspace CVE-2011-1172
- LP: #801483
- CVE-2011-1172
  * econet: 4 byte infoleak to the network CVE-2011-1173
- LP: #801484
- CVE-2011-1173
  * net: Limit socket I/O iovec total length to INT_MAX.
- LP: #708839
  * fs/partitions: Validate map_count in Mac partition tables -
CVE-2011-1010
- LP: #804225
- CVE-2011-1010
  * drm: fix unsigned vs signed comparison issue in modeset ctl ioctl,
CVE-2011-1013
- LP: #804229
- CVE-2011-1013
  * exec: copy-and-paste the fixes into compat_do_execve() paths -
CVE-2010-4243
- LP: #804234
- CVE-2010-4243
  * taskstats: don't allow duplicate entries in listener mode,
CVE-2011-2484
- LP: #806390
- CVE-2011-2484
  * dccp: handle invalid feature options length, CVE-2011-1770
- LP: #806375
- CVE-2011-1770
  * pagemap: close races with suid execve, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * report errors in /proc/*/*map* sanely, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * close race in /proc/*/environ, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * auxv: require the target to be tracable (or yourself), CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * deal with races in /proc/*/{syscall, stack, personality}, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * dccp: fix oops on Reset after close, CVE-2011-1093
- LP: #814087
- CVE-2011-1093
  * net: add limit for socket backlog CVE-2010-4251
- LP: #807462
  * tcp: use limited socket backlog CVE-2010-4251
- LP: #807462
  * ipv6: udp: Optimise multicast reception
- LP: #807462
  * ipv4: udp: Optimise multicast reception
- LP: #807462
  * udp: multicast RX should increment SNMP/sk_drops counter in allocation
failures CVE-2010-4251
- LP: #807462
  * udp: use limited socket backlog CVE-2010-4251
- LP: #807462
  * llc: use limited socket backlog CVE-2010-4251
- LP: #807462
  * sctp: use limited socket backlog CVE-2010-4251
- LP: #807462
  * tipc: use limited socket backlog CVE-2010-4251
- LP: #807462
  * x25: use limited socket backlog CVE-2010-4251
- LP: #807462
  * net: backlog functions rename CVE-2010-4251
- LP: #807462
  * net: sk_add_backlog() take rmem_alloc into account CVE-2010-4805

[Bug 801483] Re: CVE-2011-1172

2011-09-13 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24

---
linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low

  * Release tracking bug
- LP: #838037

  [ Upstream Kernel Changes ]

  * ipv6: make fragment identifications less predictable, CVE-2011-2699
- LP: #827685
- CVE-2011-2699
  * perf: Fix software event overflow, CVE-2011-2918
- LP: #834121
- CVE-2011-2918
  * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020
- LP: #813026
- CVE-2011-1020

linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low

  * Release tracking bug
- LP: #829655

  [ Upstream Kernel Changes ]

  * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016
- LP: #745686
- CVE-2011-1016
  * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016
- LP: #745686
- CVE-2011-1016
  * can-bcm: fix minor heap overflow
- LP: #690730
  * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565
- LP: #765007
- CVE-2010-4565
  * av7110: check for negative array offset
- LP: #747520
  * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1,
CVE-2011-0711
- LP: #767740
- CVE-2011-0711
  * ALSA: caiaq - Fix possible string-buffer overflow
- LP: #747520
  * IB/cm: Bump reference count on cm_id before invoking callback,
CVE-2011-0695
- LP: #770369
- CVE-2011-0695
  * RDMA/cma: Fix crash in request handlers, CVE-2011-0695
- LP: #770369
- CVE-2011-0695
  * Treat writes as new when holes span across page boundaries,
CVE-2011-0463
- LP: #770483
- CVE-2011-0463
  * net: clear heap allocations for privileged ethtool actions
- LP: #686158
  * usb: iowarrior: don't trust report_size for buffer size
- LP: #747520
  * fs/partitions/ldm.c: fix oops caused by corrupted partition table,
CVE-2011-1017
- LP: #771382
- CVE-2011-1017
  * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal
code
- LP: #747520
  * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo
- LP: #747520
  * exec: make argv/envp memory visible to oom-killer
- LP: #690730
  * next_pidmap: fix overflow condition
- LP: #772560
  * proc: do proper range check on readdir offset
- LP: #772560
  * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169
- LP: #785331
- CVE-2011-1169
  * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494
- LP: #787145
- CVE-2011-1494
  * agp: fix arbitrary kernel memory writes, CVE-1011-2022
- LP: #788684
- CVE-1011-2022
  * can: add missing socket check in can/raw release, CVE-2011-1748
- LP: #788694
- CVE-2011-1748
  * agp: fix OOM and buffer overflow
- LP: #788700
  * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack
memory - CVE-2010-3296
- CVE-2010-3296
  * drivers/net/eql.c: prevent reading uninitialized stack memory -
CVE-2010-3297
- CVE-2010-3297
  * inet_diag: Make sure we actually run the same bytecode we audited,
CVE-2010-3880
- LP: #711865
- CVE-2010-3880
  * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858
- LP: #672664
- CVE-2010-3858
  * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859
- LP: #690730
- CVE-2010-3859
  * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859
- LP: #690730
- CVE-2010-3859
  * ipc: initialize structure memory to zero for compat functions -
CVE-2010-4073
- LP: #690730
- CVE-2010-4073
  * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory -
CVE-2010-4080, CVE-2010-4081
- LP: #672664
- CVE-2010-4080, CVE-2010-4081
  * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory -
CVE-2010-4082
- CVE-2010-4082
  * sys_semctl: fix kernel stack leakage, CVE-2010-4083
- LP: #712749
- CVE-2010-4083
  * gdth: integer overflow in ioctl - CVE-2010-4157
- LP: #686158
- CVE-2010-4157
  * bio: take care not overflow page count when mapping/copying user data -
CVE-2010-4162
- LP: #721441
- CVE-2010-4162
  * bluetooth: Fix missing NULL check - CVE-2010-4242
- LP: #686158
  * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175
- LP: #721455
- CVE-2010-4175
  * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169
- LP: #690730
- CVE-2010-4169
  * block: check for proper length of iov entries in blk_rq_map_user_iov()
- CVE-2010-4163
- LP: #690730
- CVE-2010-4163
  * block: check for proper length of iov entries earlier in
blk_rq_map_user_iov(), CVE-2010-4163
- LP: #721504
- CVE-2010-4163
  * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel
oops
- LP: #795418
- CVE-2011-1577
  * Fix corrupted OSF partition table parsing
- LP: #796606
- CVE-2011-1163
  * can: Add missing socket check in 

[Bug 801483] Re: CVE-2011-1172

2011-08-24 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/maverick-proposed/linux-ti-omap4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/801483

Title:
  CVE-2011-1172

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/801483/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 801483] Re: CVE-2011-1172

2011-08-16 Thread Kees Cook
** Changed in: linux-ec2 (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-ec2 (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux-ec2 (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux-ec2 (Ubuntu Maverick)
   Importance: Undecided = Low

** Changed in: linux-ec2 (Ubuntu Natty)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-natty (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-natty (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-natty (Ubuntu Maverick)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-natty (Ubuntu Natty)
   Importance: Undecided = Low

** Changed in: linux-mvl-dove (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-mvl-dove (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux-mvl-dove (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux-mvl-dove (Ubuntu Maverick)
   Importance: Undecided = Low

** Changed in: linux-mvl-dove (Ubuntu Natty)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-maverick (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-maverick (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-maverick (Ubuntu Maverick)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-maverick (Ubuntu Natty)
   Importance: Undecided = Low

** Changed in: linux (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux (Ubuntu Maverick)
   Importance: Undecided = Low

** Changed in: linux (Ubuntu Natty)
   Importance: Undecided = Low

** Changed in: linux-ti-omap4 (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-ti-omap4 (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux-ti-omap4 (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux-ti-omap4 (Ubuntu Maverick)
   Importance: Undecided = Low

** Changed in: linux-ti-omap4 (Ubuntu Natty)
   Importance: Undecided = Low

** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-fsl-imx51 (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux-fsl-imx51 (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux-fsl-imx51 (Ubuntu Maverick)
   Importance: Undecided = Low

** Changed in: linux-fsl-imx51 (Ubuntu Natty)
   Importance: Undecided = Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/801483

Title:
  CVE-2011-1172

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/801483/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 801483] Re: CVE-2011-1172

2011-08-10 Thread Kees Cook
** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: New = Fix Released

** Changed in: linux-ec2 (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Lucid)
   Status: New = Fix Released

** Changed in: linux-mvl-dove (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Maverick)
   Status: New = Fix Released

** Changed in: linux-mvl-dove (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
   Status: New = Fix Released

** Changed in: linux-lts-backport-maverick (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Natty)
   Status: New = Invalid

** Description changed:

  net/ipv6/netfilter/ip6_tables.c in the IPv6 implementation in the Linux
  kernel before 2.6.39 does not place the expected '\0' character at the
  end of string data in the values of certain structure members, which
  allows local users to obtain potentially sensitive information from
  kernel memory by leveraging the CAP_NET_ADMIN capability to issue a
  crafted request, and then reading the argument to the resulting modprobe
  process.
  
- Fixed-by: 6a8ab060779779de8aea92ce3337ca348f973f54
+ Break-Fix: - 6a8ab060779779de8aea92ce3337ca348f973f54

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/801483

Title:
  CVE-2011-1172

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/801483/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 801483] Re: CVE-2011-1172

2011-08-08 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.24-29.92

---
linux (2.6.24-29.92) hardy-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #812360

  [Upstream Kernel Changes]

  * af_unix: limit unix_tot_inflight CVE-2010-4249
- LP: #769182
- CVE-2010-4249
  * xfs: zero proper structure size for geometry calls CVE-2011-0711
- LP: #767740
- CVE-2011-0711
  * netfilter: ip_tables: fix infoleak to userspace CVE-2011-1171
- LP: #801482
- CVE-2011-1171
  * econet: 4 byte infoleak to the network CVE-2011-1173
- LP: #801484
- CVE-2011-1173
  * netfilter: arp_tables: fix infoleak to userspace CVE-2011-1170
- LP: #801480
  * ipv6: netfilter: ip6_tables: fix infoleak to userspace CVE-2011-1172
- LP: #801483
- CVE-2011-1172
  * xen: don't allow blkback virtual CDROM device, CVE-2010-4238
- LP: #803931
- CVE-2010-4238
  * IB/uverbs: Handle large number of entries in poll CQ CVE-2010-4649
- LP: #805512
  * ipc: initialize structure memory to zero for compat functions
CVE-2010-4073
- LP: #806366
- CVE-2010-4073
  * tcp: Increase TCP_MAXSEG socket option minimum CVE-2010-4165
- LP: #806374
- CVE-2010-4165
  * taskstats: don't allow duplicate entries in listener mode,
CVE-2011-2484
- LP: #806390
- CVE-2011-2484
  * netfilter: ipt_CLUSTERIP: fix buffer overflow, CVE-2011-2534
- LP: #801473
- CVE-2011-2534
  * nfs4: Ensure that ACL pages sent over NFS were not allocated from the
slab (v3), CVE-2011-1090
- LP: #800775
- CVE-2011-1090
  * fs/partitions: Validate map_count in Mac partition tables
- LP: #804225
- CVE-2011-1010
 -- Herton Ronaldo Krzesinski herton.krzesin...@canonical.com   Mon, 18 Jul 
2011 12:36:01 -0300

** Changed in: linux (Ubuntu Hardy)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4073

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4165

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4238

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4649

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-0711

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1010

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1090

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1170

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1171

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1173

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2484

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2534

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/801483

Title:
  CVE-2011-1172

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/801483/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 801483] Re: CVE-2011-1172

2011-08-01 Thread Kees Cook
** Also affects: linux (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Oneiric)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Oneiric)
   Importance: Undecided
   Status: Invalid

** Changed in: linux (Ubuntu Lucid)
   Status: New = Fix Released

** Changed in: linux (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux (Ubuntu Hardy)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu Maverick)
   Status: New = Fix Released

** Changed in: linux (Ubuntu Natty)
   Status: New = Fix Released

** Changed in: linux-ti-omap4 (Ubuntu Maverick)
   Status: In Progress = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Natty)
   Status: New = Fix Committed

** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
   Status: In Progress = Fix Committed

** Changed in: linux-fsl-imx51 (Ubuntu Natty)
   Status: New = Invalid

** Description changed:

  net/ipv6/netfilter/ip6_tables.c in the IPv6 implementation in the Linux
- kernel before 2.6.39 does not place the expected '\0' character at the end
- of string data in the values of certain structure members, which allows
- local users to obtain potentially sensitive information from kernel memory
- by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and
- then reading the argument to the resulting modprobe process.
+ kernel before 2.6.39 does not place the expected '\0' character at the
+ end of string data in the values of certain structure members, which
+ allows local users to obtain potentially sensitive information from
+ kernel memory by leveraging the CAP_NET_ADMIN capability to issue a
+ crafted request, and then reading the argument to the resulting modprobe
+ process.
+ 
+ Fixed-by: 6a8ab060779779de8aea92ce3337ca348f973f54

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/801483

Title:
  CVE-2011-1172

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/801483/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 801483] Re: CVE-2011-1172

2011-07-07 Thread Andy Whitcroft
** Also affects: linux (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Tags added: kernel-cve-tracking-bug
** Tags removed: kernel-cve-tracker

** Changed in: linux-fsl-imx51 (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-ti-omap4 (Ubuntu Hardy)
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/801483

Title:
  CVE-2011-1172

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/801483/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 801483] Re: CVE-2011-1172

2011-07-01 Thread Paolo Pisati
** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/801483

Title:
  CVE-2011-1172

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/801483/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 801483] Re: CVE-2011-1172

2011-07-01 Thread Hans Joachim Desserud
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1172

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/801483

Title:
  CVE-2011-1172

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/801483/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 801483] Re: CVE-2011-1172

2011-06-24 Thread Andy Whitcroft
** Also affects: linux-fsl-imx51 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Maverick)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/801483

Title:
  CVE-2011-1172

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-fsl-imx51/+bug/801483/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 801483] Re: CVE-2011-1172

2011-06-24 Thread Paolo Pisati
** Changed in: linux-fsl-imx51 (Ubuntu)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
   Status: New = In Progress

** Changed in: linux-fsl-imx51 (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-ti-omap4 (Ubuntu)
   Status: New = Invalid

** Changed in: linux-ti-omap4 (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-ti-omap4 (Ubuntu Maverick)
   Status: New = In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/801483

Title:
  CVE-2011-1172

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-fsl-imx51/+bug/801483/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs