[Bug 819572] Re: CVE-2011-2689

2012-09-24 Thread Paolo Pisati
** Changed in: linux-ti-omap4 (Ubuntu Oneiric)
   Status: Fix Committed = Invalid

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: Fix Committed = Invalid

** Changed in: linux-ti-omap4 (Ubuntu)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/819572

Title:
  CVE-2011-2689

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/819572/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 819572] Re: CVE-2011-2689

2011-10-25 Thread Marc Deslauriers
** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-oneiric (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-oneiric (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Maverick)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-oneiric (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Natty)
   Importance: Undecided = Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/819572

Title:
  CVE-2011-2689

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/819572/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 819572] Re: CVE-2011-2689

2011-10-14 Thread Marc Deslauriers
** Also affects: linux (Ubuntu Precise)
   Importance: Low
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Precise)
   Importance: Low
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Precise)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Precise)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Precise)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Precise)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Precise)
   Importance: Low
   Status: Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/819572

Title:
  CVE-2011-2689

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/819572/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 819572] Re: CVE-2011-2689

2011-09-29 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-backport-natty -
2.6.38-11.50~lucid1

---
linux-lts-backport-natty (2.6.38-11.50~lucid1) lucid-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #848588

  [ Upstream Kernel Changes ]

  * Revert eCryptfs: Handle failed metadata read in lookup
  * Revert KVM: fix kvmclock regression due to missing clock update
  * Revert ath9k: use split rx buffers to get rid of order-1 skb
allocations

linux (2.6.38-11.49) natty-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #836903

  [ Adam Jackson ]

  * SAUCE: drm/i915/pch: Fix integer math bugs in panel fitting
- LP: #753994

  [ Keng-Yu Lin ]

  * SAUCE: Input: ALPS - Enable Intellimouse mode for Lenovo Zhaoyang E47
- LP: #632884, #803005

  [ Stefan Bader ]

  * [Config] Force perf to use libiberty for demangling
- LP: #783660

  [ Tim Gardner ]

  * [Config] Add enic/fnic to udebs
- LP: #801610

  [ Upstream Kernel Changes ]

  * eeepc-wmi: add keys found on EeePC 1215T
- LP: #812644
  * eCryptfs: Handle failed metadata read in lookup
- LP: #509180
  * pagemap: close races with suid execve, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * report errors in /proc/*/*map* sanely, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * close race in /proc/*/environ, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * auxv: require the target to be tracable (or yourself), CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * deal with races in /proc/*/{syscall, stack, personality}, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * vmscan: fix a livelock in kswapd
- LP: #813797
  * mmc: Add PCI fixup quirks for Ricoh 1180:e823 reader
- LP: #773524
  * mmc: Added quirks for Ricoh 1180:e823 lower base clock frequency
- LP: #773524
  * rose: Add length checks to CALL_REQUEST parsing, CVE-2011-1493
- LP: #816550
- CVE-2011-1493
  * pata_marvell: Add support for 88SE91A0, 88SE91A4
- LP: #777325
  * GFS2: make sure fallocate bytes is a multiple of blksize, CVE-2011-2689
- LP: #819572
- CVE-2011-2689
  * Bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace.
- LP: #819569
- CVE-2011-2492
  * drm/nv50-nvc0: work around an evo channel hang that some people see
- LP: #583760
  * KVM: fix kvmclock regression due to missing clock update
- LP: #795717
  * Add mount option to check uid of device being mounted = expect uid,
CVE-2011-1833
- LP: #732628
- CVE-2011-1833
  * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * ipv6: make fragment identifications less predictable, CVE-2011-2699
- LP: #827685
- CVE-2011-2699
  * ath9k: use split rx buffers to get rid of order-1 skb allocations
- LP: #728835
  * perf: Fix software event overflow, CVE-2011-2918
- LP: #834121
- CVE-2011-2918

linux (2.6.38-11.48) natty-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #818175

  [ Upstream Kernel Changes ]

  * Revert HID: magicmouse: ignore 'ivalid report id' while switching
modes
- LP: #814250

linux (2.6.38-11.47) natty-proposed; urgency=low

  [Steve Conklin]

  * Release Tracking Bug
- LP: #811180

  [ Keng-Yu Lin ]

  * SAUCE: Revert: dell-laptop: Toggle the unsupported hardware
killswitch
- LP: #775281

  [ Ming Lei ]

  * SAUCE: fix yama_ptracer_del lockdep warning
- LP: #791019

  [ Stefan Bader ]

  * SAUCE: Re-enable RODATA for i386 virtual
- LP: #809838

  [ Tim Gardner ]

  * [Config] Add grub-efi as a recommended bootloader for server and
generic
- LP: #800910
  * SAUCE: rtl8192se: Force a build for a 2.6/3.0 kernel
- LP: #805494

  [ Upstream Kernel Changes ]

  * Revert bridge: Forward reserved group addresses if !STP
- LP: #793702
  * Fix up ABI directory
  * bonding: Incorrect TX queue offset, CVE-2011-1581
- LP: #792312
- CVE-2011-1581
  * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel
oops
- LP: #795418
- CVE-2011-1577
  * usbnet/cdc_ncm: add missing .reset_resume hook
- LP: #793892
  * ath5k: Disable fast channel switching by default
- LP: #767192
  * mm: vmscan: correctly check if reclaimer should schedule during
shrink_slab
- LP: #755066
  * mm: vmscan: correct use of pgdat_balanced in sleeping_prematurely
- LP: #755066
  * ALSA: hda - Use LPIB for ATI/AMD chipsets as default
- LP: #741825
  * ALSA: hda - Enable snoop bit for AMD controllers
- LP: #741825
  * ALSA: hda - Enable sync_write workaround for AMD generically
- LP: #741825
  * cpuidle: menu: fixed wrapping timers at 4.294 seconds
- LP: #774947
  * drm/i915: Fix gen6 (SNB) missed BLT ring interrupts.
- LP: #761065
  * USB: ehci: remove structure packing from ehci_def
- LP: #791552
  * drm/i915: disable PCH ports if needed when disabling a 

[Bug 819572] Re: CVE-2011-2689

2011-09-21 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 2.6.38-1209.15

---
linux-ti-omap4 (2.6.38-1209.15) natty-proposed; urgency=low

  * Release tracking bug
- LP: #837761

  [ Paolo Pisati ]

  * [Config] Turn on CONFIG_USER_NS and DEVPTS_MULTIPLE_INSTANCES.
- LP: #787749

  [ Tim Gardner ]

  * [Config] Add enic/fnic to nic-modules udeb, CVE-2011-1020
- LP: #801610

  [ Upstream Kernel Changes ]

  * mpt2sas: prevent heap overflows and unchecked reads
- LP: #780546
  * agp: fix arbitrary kernel memory writes
- LP: #775809
  * can: add missing socket check in can/raw release
- LP: #780546
  * agp: fix OOM and buffer overflow
- LP: #775809
  * bonding: Incorrect TX queue offset, CVE-2011-1581
- LP: #792312
- CVE-2011-1581
  * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel
oops
- LP: #795418
- CVE-2011-1577
  * can: Add missing socket check in can/bcm release.
- LP: #796502
- CVE-2011-1598
  * USB: ehci: remove structure packing from ehci_def
- LP: #791552
  * taskstats: don't allow duplicate entries in listener mode,
CVE-2011-2484
- LP: #806390
- CVE-2011-2484
  * ext4: init timer earlier to avoid a kernel panic in __save_error_info,
CVE-2011-2493
- LP: #806929
- CVE-2011-2493
  * dccp: handle invalid feature options length, CVE-2011-1770
- LP: #806375
- CVE-2011-1770
  * pagemap: close races with suid execve, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * report errors in /proc/*/*map* sanely, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * close race in /proc/*/environ, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * auxv: require the target to be tracable (or yourself), CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * deal with races in /proc/*/{syscall, stack, personality}, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * rose: Add length checks to CALL_REQUEST parsing, CVE-2011-1493
- LP: #816550
- CVE-2011-1493
  * GFS2: make sure fallocate bytes is a multiple of blksize, CVE-2011-2689
- LP: #819572
- CVE-2011-2689
  * Bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace.
- LP: #819569
- CVE-2011-2492
  * Add mount option to check uid of device being mounted = expect uid,
CVE-2011-1833
- LP: #732628
- CVE-2011-1833
  * ipv6: make fragment identifications less predictable, CVE-2011-2699
- LP: #827685
- CVE-2011-2699
  * perf: Fix software event overflow, CVE-2011-2918
- LP: #834121
- CVE-2011-2918
  * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020
- LP: #813026
- CVE-2011-1020

linux-ti-omap4 (2.6.38-1209.13) natty; urgency=low

  [ Tim Gardner ]

  * Release Tracking Bug
- LP: #772381

  [ Brad Figg ]

  * Ubuntu-2.6.38-9.43

  [ Bryan Wu ]

  * merge Ubuntu-2.6.38-9.43
  * cherry-pick 6 patches from u2 of 'for-ubuntu' branch
  * [Config] Sync up configs for 2.6.38.4

  [ Herton Ronaldo Krzesinski ]

  * SAUCE: Revert x86, hibernate: Initialize mmu_cr4_features during boot
- LP: #764758

  [ Leann Ogasawara ]

  * [Config] updateconfigs for 2.6.38.4

  [ Paolo Pisati ]

  * [Config] s/USB_MUSB_TUSB6010/USB_MUSB_OMAP2PLUS/ on omap3 to get musb
- LP: #759913

  [ Serge E. Hallyn ]

  * SAUCE: kvm: fix push of wrong eip when doing softint
- LP: #747090

  [ Tim Gardner ]

  * [Config] Add cachefiles.ko to virtual flavour
- LP: #770430

  [ Upstream Kernel Changes ]

  * Revert net/sunrpc: Use static const char arrays
- LP: #761134
  * Revert x86: Cleanup highmap after brk is concluded
- LP: #761134
  * ALSA: hda - Fix SPDIF out regression on ALC889
- LP: #761134
  * ALSA: Fix yet another race in disconnection
- LP: #761134
  * ALSA: vmalloc buffers should use normal mmap
- LP: #761134
  * perf: Better fit max unprivileged mlock pages for tools needs
- LP: #761134
  * myri10ge: fix rmmod crash
- LP: #761134
  * cciss: fix lost command issue
- LP: #761134
  * ath9k: Fix kernel panic in AR2427
- LP: #761134
  * sound/oss/opl3: validate voice and channel indexes
- LP: #761134
  * mac80211: initialize sta-last_rx in sta_info_alloc
- LP: #761134
  * ses: show devices for enclosures with no page 7
- LP: #761134
  * ses: Avoid kernel panic when lun 0 is not mapped
- LP: #761134
  * PCI/ACPI: Report ASPM support to BIOS if not disabled from command line
- LP: #761134
  * eCryptfs: Unlock page in write_begin error path
- LP: #761134
  * eCryptfs: ecryptfs_keyring_auth_tok_for_sig() bug fix
- LP: #761134
  * crypto: aesni-intel - fixed problem with packets that are not multiple
of 64bytes
- LP: #761134
  * staging: usbip: bugfixes related to kthread conversion
- LP: #761134
  * staging: usbip: bugfix add number of packets for isochronous frames
- LP: #761134
  * staging: usbip: bugfix for isochronous packets and optimization
- LP: #761134
  * staging: hv: use 

[Bug 819572] Re: CVE-2011-2689

2011-09-21 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.38-11.50

---
linux (2.6.38-11.50) natty-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #848246

  [ Upstream Kernel Changes ]

  * Revert eCryptfs: Handle failed metadata read in lookup
  * Revert KVM: fix kvmclock regression due to missing clock update
  * Revert ath9k: use split rx buffers to get rid of order-1 skb
allocations

linux (2.6.38-11.49) natty-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #836903

  [ Adam Jackson ]

  * SAUCE: drm/i915/pch: Fix integer math bugs in panel fitting
- LP: #753994

  [ Keng-Yu Lin ]

  * SAUCE: Input: ALPS - Enable Intellimouse mode for Lenovo Zhaoyang E47
- LP: #632884, #803005

  [ Stefan Bader ]

  * [Config] Force perf to use libiberty for demangling
- LP: #783660

  [ Tim Gardner ]

  * [Config] Add enic/fnic to udebs
- LP: #801610

  [ Upstream Kernel Changes ]

  * eeepc-wmi: add keys found on EeePC 1215T
- LP: #812644
  * eCryptfs: Handle failed metadata read in lookup
- LP: #509180
  * pagemap: close races with suid execve, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * report errors in /proc/*/*map* sanely, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * close race in /proc/*/environ, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * auxv: require the target to be tracable (or yourself), CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * deal with races in /proc/*/{syscall, stack, personality}, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * vmscan: fix a livelock in kswapd
- LP: #813797
  * mmc: Add PCI fixup quirks for Ricoh 1180:e823 reader
- LP: #773524
  * mmc: Added quirks for Ricoh 1180:e823 lower base clock frequency
- LP: #773524
  * rose: Add length checks to CALL_REQUEST parsing, CVE-2011-1493
- LP: #816550
- CVE-2011-1493
  * pata_marvell: Add support for 88SE91A0, 88SE91A4
- LP: #777325
  * GFS2: make sure fallocate bytes is a multiple of blksize, CVE-2011-2689
- LP: #819572
- CVE-2011-2689
  * Bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace.
- LP: #819569
- CVE-2011-2492
  * drm/nv50-nvc0: work around an evo channel hang that some people see
- LP: #583760
  * KVM: fix kvmclock regression due to missing clock update
- LP: #795717
  * Add mount option to check uid of device being mounted = expect uid,
CVE-2011-1833
- LP: #732628
- CVE-2011-1833
  * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * ipv6: make fragment identifications less predictable, CVE-2011-2699
- LP: #827685
- CVE-2011-2699
  * ath9k: use split rx buffers to get rid of order-1 skb allocations
- LP: #728835
  * perf: Fix software event overflow, CVE-2011-2918
- LP: #834121
- CVE-2011-2918
 -- Herton Ronaldo Krzesinski herton.krzesin...@canonical.com   Mon, 12 Sep 
2011 17:23:38 -0300

** Changed in: linux (Ubuntu Natty)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/819572

Title:
  CVE-2011-2689

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/819572/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 819572] Re: CVE-2011-2689

2011-09-01 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-natty

** Branch linked: lp:ubuntu/natty-proposed/linux-ti-omap4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/819572

Title:
  CVE-2011-2689

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/819572/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 819572] Re: CVE-2011-2689

2011-08-16 Thread Kees Cook
** Changed in: linux-ec2 (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-ec2 (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux-ec2 (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux-ec2 (Ubuntu Maverick)
   Importance: Undecided = Low

** Changed in: linux-ec2 (Ubuntu Natty)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-natty (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-natty (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-natty (Ubuntu Maverick)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-natty (Ubuntu Natty)
   Importance: Undecided = Low

** Changed in: linux-mvl-dove (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-mvl-dove (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux-mvl-dove (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux-mvl-dove (Ubuntu Maverick)
   Importance: Undecided = Low

** Changed in: linux-mvl-dove (Ubuntu Natty)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-maverick (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-maverick (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-maverick (Ubuntu Maverick)
   Importance: Undecided = Low

** Changed in: linux-lts-backport-maverick (Ubuntu Natty)
   Importance: Undecided = Low

** Changed in: linux (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux (Ubuntu Maverick)
   Importance: Undecided = Low

** Changed in: linux (Ubuntu Natty)
   Importance: Undecided = Low

** Changed in: linux-ti-omap4 (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-ti-omap4 (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux-ti-omap4 (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux-ti-omap4 (Ubuntu Maverick)
   Importance: Undecided = Low

** Changed in: linux-ti-omap4 (Ubuntu Natty)
   Importance: Undecided = Low

** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-fsl-imx51 (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux-fsl-imx51 (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux-fsl-imx51 (Ubuntu Maverick)
   Importance: Undecided = Low

** Changed in: linux-fsl-imx51 (Ubuntu Natty)
   Importance: Undecided = Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/819572

Title:
  CVE-2011-2689

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/819572/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 819572] Re: CVE-2011-2689

2011-08-10 Thread Kees Cook
** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Natty)
   Status: New = Invalid

** Description changed:

  The gfs2_fallocate function in fs/gfs2/file.c in the Linux kernel before
  3.0-rc1 does not ensure that the size of a chunk allocation is a
  multiple of the block size, which allows local users to cause a denial
  of service (BUG and system crash) by arranging for all resource groups
  to have too little free space.
  
- Introduced-by: 3921120e757f9167f3fcd3a1781239824471b14d
- Fixed-by: 6905d9e4dda6112f007e9090bca80507da158e63
+ Break-Fix: 3921120e757f9167f3fcd3a1781239824471b14d
+ 6905d9e4dda6112f007e9090bca80507da158e63

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/819572

Title:
  CVE-2011-2689

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/819572/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 819572] Re: CVE-2011-2689

2011-08-08 Thread Kees Cook
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: In Progress = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/819572

Title:
  CVE-2011-2689

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/819572/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 819572] Re: CVE-2011-2689

2011-08-02 Thread Andy Whitcroft
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: New = In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/819572

Title:
  CVE-2011-2689

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/819572/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 819572] Re: CVE-2011-2689

2011-08-02 Thread Andy Whitcroft
** Changed in: linux (Ubuntu Natty)
   Status: New = In Progress

** Changed in: linux (Ubuntu Natty)
 Assignee: (unassigned) = Andy Whitcroft (apw)

** Changed in: linux-ti-omap4 (Ubuntu Natty)
   Status: New = In Progress

** Changed in: linux-ti-omap4 (Ubuntu Natty)
 Assignee: (unassigned) = Andy Whitcroft (apw)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/819572

Title:
  CVE-2011-2689

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/819572/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 819572] Re: CVE-2011-2689

2011-08-02 Thread Tim Gardner
** Changed in: linux (Ubuntu Natty)
   Status: In Progress = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Natty)
   Status: In Progress = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/819572

Title:
  CVE-2011-2689

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/819572/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 819572] Re: CVE-2011-2689

2011-08-02 Thread Kees Cook
** Description changed:

  The gfs2_fallocate function in fs/gfs2/file.c in the Linux kernel before
  3.0-rc1 does not ensure that the size of a chunk allocation is a
  multiple of the block size, which allows local users to cause a denial
  of service (BUG and system crash) by arranging for all resource groups
  to have too little free space.
  
+ Introduced-by: 3921120e757f9167f3fcd3a1781239824471b14d
  Fixed-by: 6905d9e4dda6112f007e9090bca80507da158e63

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/819572

Title:
  CVE-2011-2689

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/819572/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 819572] Re: CVE-2011-2689

2011-08-01 Thread Kees Cook
** Changed in: linux-lts-backport-natty (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-ti-omap4 (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-ti-omap4 (Ubuntu Oneiric)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-ti-omap4 (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Natty)
   Status: New = Invalid

** Description changed:

- Placeholder
+ The gfs2_fallocate function in fs/gfs2/file.c in the Linux kernel before
+ 3.0-rc1 does not ensure that the size of a chunk allocation is a multiple
+ of the block size, which allows local users to cause a denial of service
+ (BUG and system crash) by arranging for all resource groups to have too
+ little free space.
+ 
+ Fixed-by: 6905d9e4dda6112f007e9090bca80507da158e63

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/819572

Title:
  CVE-2011-2689

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/819572/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 819572] Re: CVE-2011-2689

2011-08-01 Thread Kees Cook
** Description changed:

  The gfs2_fallocate function in fs/gfs2/file.c in the Linux kernel before
- 3.0-rc1 does not ensure that the size of a chunk allocation is a multiple
- of the block size, which allows local users to cause a denial of service
- (BUG and system crash) by arranging for all resource groups to have too
- little free space.
+ 3.0-rc1 does not ensure that the size of a chunk allocation is a
+ multiple of the block size, which allows local users to cause a denial
+ of service (BUG and system crash) by arranging for all resource groups
+ to have too little free space.
  
  Fixed-by: 6905d9e4dda6112f007e9090bca80507da158e63

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/819572

Title:
  CVE-2011-2689

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/819572/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs