[Bug 844371] Re: CVE-2011-2723

2011-12-21 Thread Paolo Pisati
** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: Fix Committed = Fix Released

** Changed in: linux-ti-omap4 (Ubuntu Oneiric)
   Status: Fix Committed = Fix Released

** Changed in: linux (Ubuntu Precise)
   Status: Fix Committed = Fix Released

** Changed in: linux (Ubuntu Oneiric)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/844371

Title:
  CVE-2011-2723

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/844371/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 844371] Re: CVE-2011-2723

2011-10-25 Thread Marc Deslauriers
** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric)
   Importance: Undecided = Medium

** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-lts-backport-oneiric (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy)
   Importance: Undecided = Medium

** Changed in: linux-lts-backport-oneiric (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Maverick)
   Importance: Undecided = Medium

** Changed in: linux-lts-backport-oneiric (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Natty)
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/844371

Title:
  CVE-2011-2723

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/844371/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 844371] Re: CVE-2011-2723

2011-10-24 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.38-12.51

---
linux (2.6.38-12.51) natty-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #860832

  [ Alex Bligh ]

  * SAUCE: net/netfilter/nf_conntrack_netlink.c: fix Oops on container
destroy
- LP: #843892

  [ Jesse Sung ]

  * SAUCE: Unregister input device only if it is registered
- LP: #839238

  [ Leann Ogasawara ]

  * SAUCE: x86: reboot: Make Dell Latitude E6220 use reboot=pci
- LP: #838402
  * SAUCE: x86: reboot: Make Dell Latitude E6520 use reboot=pci
- LP: #833705

  [ Ming Lei ]

  * SAUCE: fireware: add NO_MSI quirks for o2micro controller
- LP: #801719

  [ Stefan Bader ]

  * [Config] Include all filesystem modules for virtual
- LP: #761809

  [ Tim Gardner ]

  * [Config] kernel preparation cannot be parallelized
  * [Config] Linearize module/abi checks
  * [Config] Linearize and simplify tree preparation rules
  * [Config] Build kernel image in parallel with modules
  * [Config] Set concurrency for kmake invocations
  * [Config] Improve install-arch-headers speed
  * [Config] Fix binary-perarch dependencies
  * [Config] Removed stamp-flavours target
  * [Config] Serialize binary indep targets
  * [Config] Use build stamp directly
  * [Config] Restore prepare-% target
  * [Config] Fix binary-% build target

  [ Upstream Kernel Changes ]

  * Revert drm/i915: disable PCH ports if needed when disabling a CRTC
- LP: #814325, #838181
  * drm/i915: restore only the mode of this driver on lastclose (v2)
- LP: #848687
  * cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191
- LP: #834135
- CVE-2011-3191
  * befs: Validate length of long symbolic links, CVE-2011-2928
- LP: #834124
- CVE-2011-2928
  * gro: Only reset frag0 when skb can be pulled, CVE-2011-2723
- LP: #844371
- CVE-2011-2723
  * inet_diag: fix inet_diag_bc_audit(), CVE-2011-2213
- LP: #838421
- CVE-2011-2213
  * si4713-i2c: avoid potential buffer overflow on si4713, CVE-2011-2700
- LP: #844370
- CVE-2011-2700
  * Bluetooth: Prevent buffer overflow in l2cap config request,
CVE-2011-2497
- LP: #838423
- CVE-2011-2497
  * crypto: Move md5_transform to lib/md5.c, CVE-2011-3188
- LP: #834129
- CVE-2011-3188
  * net: Compute protocol sequence numbers and fragment IDs using MD5,
CVE-2011-3188
- LP: #834129
- CVE-2011-3188
  * x86, intel, power: Initialize MSR_IA32_ENERGY_PERF_BIAS
- LP: #760131
  * x86, intel, power: Correct the MSR_IA32_ENERGY_PERF_BIAS message
- LP: #760131
  * rt2x00: Serialize TX operations on a queue.
- LP: #855239
  * ext4: Fix max file size and logical block counting of extent format
file, CVE-2011-2695
- LP: #819574
- CVE-2011-2695
 -- Herton Ronaldo Krzesinski herton.krzesin...@canonical.com   Tue, 27 Sep 
2011 16:19:57 -0300

** Changed in: linux (Ubuntu Natty)
   Status: Fix Committed = Fix Released

** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/844371

Title:
  CVE-2011-2723

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/844371/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 844371] Re: CVE-2011-2723

2011-10-24 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-backport-natty -
2.6.38-12.51~lucid1

---
linux-lts-backport-natty (2.6.38-12.51~lucid1) lucid-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #862556

  [ Alex Bligh ]

  * SAUCE: net/netfilter/nf_conntrack_netlink.c: fix Oops on container
destroy
- LP: #843892

  [ Jesse Sung ]

  * SAUCE: Unregister input device only if it is registered
- LP: #839238

  [ Leann Ogasawara ]

  * SAUCE: x86: reboot: Make Dell Latitude E6220 use reboot=pci
- LP: #838402
  * SAUCE: x86: reboot: Make Dell Latitude E6520 use reboot=pci
- LP: #833705

  [ Ming Lei ]

  * SAUCE: fireware: add NO_MSI quirks for o2micro controller
- LP: #801719

  [ Stefan Bader ]

  * [Config] Include all filesystem modules for virtual
- LP: #761809

  [ Tim Gardner ]

  * [Config] kernel preparation cannot be parallelized
  * [Config] Linearize module/abi checks
  * [Config] Linearize and simplify tree preparation rules
  * [Config] Build kernel image in parallel with modules
  * [Config] Set concurrency for kmake invocations
  * [Config] Improve install-arch-headers speed
  * [Config] Fix binary-perarch dependencies
  * [Config] Removed stamp-flavours target
  * [Config] Serialize binary indep targets
  * [Config] Use build stamp directly
  * [Config] Restore prepare-% target
  * [Config] Fix binary-% build target

  [ Upstream Kernel Changes ]

  * Revert drm/i915: disable PCH ports if needed when disabling a CRTC
- LP: #814325, #838181
  * drm/i915: restore only the mode of this driver on lastclose (v2)
- LP: #848687
  * cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191
- LP: #834135
- CVE-2011-3191
  * befs: Validate length of long symbolic links, CVE-2011-2928
- LP: #834124
- CVE-2011-2928
  * gro: Only reset frag0 when skb can be pulled, CVE-2011-2723
- LP: #844371
- CVE-2011-2723
  * inet_diag: fix inet_diag_bc_audit(), CVE-2011-2213
- LP: #838421
- CVE-2011-2213
  * si4713-i2c: avoid potential buffer overflow on si4713, CVE-2011-2700
- LP: #844370
- CVE-2011-2700
  * Bluetooth: Prevent buffer overflow in l2cap config request,
CVE-2011-2497
- LP: #838423
- CVE-2011-2497
  * crypto: Move md5_transform to lib/md5.c, CVE-2011-3188
- LP: #834129
- CVE-2011-3188
  * net: Compute protocol sequence numbers and fragment IDs using MD5,
CVE-2011-3188
- LP: #834129
- CVE-2011-3188
  * x86, intel, power: Initialize MSR_IA32_ENERGY_PERF_BIAS
- LP: #760131
  * x86, intel, power: Correct the MSR_IA32_ENERGY_PERF_BIAS message
- LP: #760131
  * rt2x00: Serialize TX operations on a queue.
- LP: #855239
  * ext4: Fix max file size and logical block counting of extent format
file, CVE-2011-2695
- LP: #819574
- CVE-2011-2695

linux (2.6.38-11.50) natty-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #848246

  [ Upstream Kernel Changes ]

  * Revert eCryptfs: Handle failed metadata read in lookup
  * Revert KVM: fix kvmclock regression due to missing clock update
  * Revert ath9k: use split rx buffers to get rid of order-1 skb
allocations
 -- Herton Ronaldo Krzesinski herton.krzesin...@canonical.com   Thu, 29 Sep 
2011 15:40:51 -0300

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/844371

Title:
  CVE-2011-2723

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/844371/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 844371] Re: CVE-2011-2723

2011-10-24 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-fsl-imx51 - 2.6.31-611.29

---
linux-fsl-imx51 (2.6.31-611.29) lucid-proposed; urgency=low

  * Release tracking bug
- LP: #873059

  [ Upstream Kernel Changes ]

  * cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191
- LP: #834135
- CVE-2011-3191
  * befs: Validate length of long symbolic links, CVE-2011-2928
- LP: #834124
- CVE-2011-2928
  * gro: Only reset frag0 when skb can be pulled, CVE-2011-2723
- LP: #844371
- CVE-2011-2723
  * Validate size of EFI GUID partition entries, CVE-2011-1776
- LP: #844365
- CVE-2011-1776
  * inet_diag: fix inet_diag_bc_audit(), CVE-2011-2213
- LP: #838421
- CVE-2011-2213
  * Bluetooth: Prevent buffer overflow in l2cap config request,
CVE-2011-2497
- LP: #838423
- CVE-2011-2497
  * core: Fix memory leak/corruption on VLAN GRO_DROP, CVE-2011-1576
- LP: #844361
- CVE-2011-1576
  * crypto: Move md5_transform to lib/md5.c, CVE-2011-3188
- LP: #827462, #834129
- CVE-2011-3188
  * net: Compute protocol sequence numbers and fragment IDs using MD5,
CVE-2011-3188
- LP: #827462, #834129
- CVE-2011-3188
  * ext4: correctly calculate number of blocks for fiemap, CVE-2011-2695
- LP: #474597, #583414, #819574
- CVE-2011-2695
  * ext4: Fix max file size and logical block counting of extent format
file, CVE-2011-2695
- LP: #819574
- CVE-2011-2695
  * cifs: always do is_path_accessible check in cifs_mount, CVE-2011-3363
- LP: #866034
- CVE-2011-3363
  * cifs: add fallback in is_path_accessible for old servers, CVE-2011-3363
- LP: #866034
- CVE-2011-3363
  * Make TASKSTATS require root access, CVE-2011-2494
- LP: #866021
- CVE-2011-2494
  * proc: restrict access to /proc/PID/io, CVE-2011-2495
- LP: #866025
- CVE-2011-2495
  * proc: fix a race in do_io_accounting(), CVE-2011-2495
- LP: #866025
- CVE-2011-2495
  * staging: comedi: fix infoleak to userspace, CVE-2011-2909
- LP: #869261
- CVE-2011-2909
  * sctp: fix to calc the INIT/INIT-ACK chunk length correctly is set,
CVE-2011-1573
- LP: #869205
- CVE-2011-1573
  * perf tools: do not look at ./config for configuration, CVE-2011-2905
- LP: #869259
- CVE-2011-2905
  * net_sched: Fix qdisc_notify() - CVE-2011-2525
- LP: #869250
- CVE-2011-2525
  * nl80211: fix overflow in ssid_len - CVE-2011-2517
- LP: #869245
- CVE-2011-2517
  * mm: avoid wrapping vm_pgoff in mremap() - CVE-2011-2496
- LP: #869243
- CVE-2011-2496
  * vm: fix vm_pgoff wrap in stack expansion - CVE-2011-2496
- LP: #869243
- CVE-2011-2496
  * vm: fix vm_pgoff wrap in upward expansion - CVE-2011-2496
- LP: #869243
- CVE-2011-2496
 -- Paolo Pisati paolo.pis...@canonical.com   Thu, 13 Oct 2011 12:19:09 +0200

** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1573

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2494

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2495

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2496

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2517

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2525

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2905

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2909

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3363

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/844371

Title:
  CVE-2011-2723

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/844371/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 844371] Re: CVE-2011-2723

2011-10-14 Thread Marc Deslauriers
** Also affects: linux (Ubuntu Precise)
   Importance: Medium
   Status: Fix Committed

** Also affects: linux-ec2 (Ubuntu Precise)
   Importance: Medium
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Precise)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Precise)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Precise)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Precise)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Precise)
   Importance: Medium
   Status: Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/844371

Title:
  CVE-2011-2723

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/844371/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 844371] Re: CVE-2011-2723

2011-10-11 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.35-30.60

---
linux (2.6.35-30.60) maverick-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #854092

  [ Stefan Bader ]

  * [Config] Force perf to use libiberty for demangling
- LP: #783660

  [ Tim Gardner ]

  * [Config] Simplify binary-udebs dependencies
  * [Config] kernel preparation cannot be parallelized
  * [Config] Linearize module/abi checks
  * [Config] Linearize and simplify tree preparation rules
  * [Config] Build kernel image in parallel with modules
  * [Config] Set concurrency for kmake invocations
  * [Config] Improve install-arch-headers speed
  * [Config] Fix binary-perarch dependencies
  * [Config] Removed stamp-flavours target
  * [Config] Serialize binary indep targets
  * [Config] Use build stamp directly
  * [Config] Restore prepare-% target
  * [Config] Fix binary-% build target

  [ Upstream Kernel Changes ]

  * Add mount option to check uid of device being mounted = expect uid,
CVE-2011-1833
- LP: #732628
- CVE-2011-1833
  * ipv6: make fragment identifications less predictable, CVE-2011-2699
- LP: #827685
- CVE-2011-2699
  * perf: Fix software event overflow, CVE-2011-2918
- LP: #834121
- CVE-2011-2918
  * cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191
- LP: #834135
- CVE-2011-3191
  * befs: Validate length of long symbolic links, CVE-2011-2928
- LP: #834124
- CVE-2011-2928
  * gro: Only reset frag0 when skb can be pulled, CVE-2011-2723
- LP: #844371
- CVE-2011-2723
  * Validate size of EFI GUID partition entries, CVE-2011-1776
- LP: #844365
- CVE-2011-1776
  * inet_diag: fix inet_diag_bc_audit(), CVE-2011-2213
- LP: #838421
- CVE-2011-2213
  * si4713-i2c: avoid potential buffer overflow on si4713, CVE-2011-2700
- LP: #844370
- CVE-2011-2700
  * Bluetooth: Prevent buffer overflow in l2cap config request,
CVE-2011-2497
- LP: #838423
- CVE-2011-2497
  * core: Fix memory leak/corruption on VLAN GRO_DROP, CVE-2011-1576
- LP: #844361
- CVE-2011-1576
 -- Herton Ronaldo Krzesinski herton.krzesin...@canonical.com   Mon, 19 Sep 
2011 15:10:43 -0300

** Changed in: linux (Ubuntu Maverick)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/844371

Title:
  CVE-2011-2723

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/844371/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 844371] Re: CVE-2011-2723

2011-10-11 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 2.6.38-1209.16

---
linux-ti-omap4 (2.6.38-1209.16) natty-proposed; urgency=low

  * Release tracking bug
- LP: #862554

  [ Ming Lei ]

  * SAUCE: usb: ehci: make HC see up-to-date qh/qtd descriptor ASAP
- LP: #709245

  [ Upstream Kernel Changes ]

  * cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191
- LP: #834135
- CVE-2011-3191
  * befs: Validate length of long symbolic links, CVE-2011-2928
- LP: #834124
- CVE-2011-2928
  * gro: Only reset frag0 when skb can be pulled, CVE-2011-2723
- LP: #844371
- CVE-2011-2723
  * Validate size of EFI GUID partition entries, CVE-2011-1776
- LP: #844365
- CVE-2011-1776
  * inet_diag: fix inet_diag_bc_audit(), CVE-2011-2213
- LP: #838421
- CVE-2011-2213
  * si4713-i2c: avoid potential buffer overflow on si4713, CVE-2011-2700
- LP: #844370
- CVE-2011-2700
  * Bluetooth: Prevent buffer overflow in l2cap config request,
CVE-2011-2497
- LP: #838423
- CVE-2011-2497
  * crypto: Move md5_transform to lib/md5.c, CVE-2011-3188
- LP: #834129
- CVE-2011-3188
  * net: Compute protocol sequence numbers and fragment IDs using MD5,
CVE-2011-3188
- LP: #834129
- CVE-2011-3188
  * ext4: Fix max file size and logical block counting of extent format
file, CVE-2011-2695
- LP: #819574
- CVE-2011-2695
 -- Paolo Pisati paolo.pis...@canonical.com   Fri, 30 Sep 2011 12:12:00 +0200

** Changed in: linux-ti-omap4 (Ubuntu Natty)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2695

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/844371

Title:
  CVE-2011-2723

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/844371/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 844371] Re: CVE-2011-2723

2011-10-04 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-natty

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/844371

Title:
  CVE-2011-2723

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/844371/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 844371] Re: CVE-2011-2723

2011-10-04 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/natty-proposed/linux-ti-omap4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/844371

Title:
  CVE-2011-2723

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/844371/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 844371] Re: CVE-2011-2723

2011-09-29 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-backport-maverick -
2.6.35-30.60~lucid1

---
linux-lts-backport-maverick (2.6.35-30.60~lucid1) lucid-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #854430

  [ Stefan Bader ]

  * [Config] Force perf to use libiberty for demangling
- LP: #783660

  [ Tim Gardner ]

  * [Config] Simplify binary-udebs dependencies
  * [Config] kernel preparation cannot be parallelized
  * [Config] Linearize module/abi checks
  * [Config] Linearize and simplify tree preparation rules
  * [Config] Build kernel image in parallel with modules
  * [Config] Set concurrency for kmake invocations
  * [Config] Improve install-arch-headers speed
  * [Config] Fix binary-perarch dependencies
  * [Config] Removed stamp-flavours target
  * [Config] Serialize binary indep targets
  * [Config] Use build stamp directly
  * [Config] Restore prepare-% target
  * [Config] Fix binary-% build target

  [ Upstream Kernel Changes ]

  * Add mount option to check uid of device being mounted = expect uid,
CVE-2011-1833
- LP: #732628
- CVE-2011-1833
  * ipv6: make fragment identifications less predictable, CVE-2011-2699
- LP: #827685
- CVE-2011-2699
  * perf: Fix software event overflow, CVE-2011-2918
- LP: #834121
- CVE-2011-2918
  * cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191
- LP: #834135
- CVE-2011-3191
  * befs: Validate length of long symbolic links, CVE-2011-2928
- LP: #834124
- CVE-2011-2928
  * gro: Only reset frag0 when skb can be pulled, CVE-2011-2723
- LP: #844371
- CVE-2011-2723
  * Validate size of EFI GUID partition entries, CVE-2011-1776
- LP: #844365
- CVE-2011-1776
  * inet_diag: fix inet_diag_bc_audit(), CVE-2011-2213
- LP: #838421
- CVE-2011-2213
  * si4713-i2c: avoid potential buffer overflow on si4713, CVE-2011-2700
- LP: #844370
- CVE-2011-2700
  * Bluetooth: Prevent buffer overflow in l2cap config request,
CVE-2011-2497
- LP: #838423
- CVE-2011-2497
  * core: Fix memory leak/corruption on VLAN GRO_DROP, CVE-2011-1576
- LP: #844361
- CVE-2011-1576

linux (2.6.35-30.59) maverick-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #837449

  [ Upstream Kernel Changes ]

  * Revert drm/nv50-nvc0: work around an evo channel hang that some people
see
  * Revert eCryptfs: Handle failed metadata read in lookup
 -- Herton Ronaldo Krzesinski herton.krzesin...@canonical.com   Tue, 20 Sep 
2011 11:03:51 -0300

** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1576

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1776

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1833

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2213

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2497

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2699

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2700

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2918

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2928

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3191

** Changed in: linux-ti-omap4 (Ubuntu Maverick)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3188

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/844371

Title:
  CVE-2011-2723

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/844371/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 844371] Re: CVE-2011-2723

2011-09-29 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.25

---
linux-ti-omap4 (2.6.35-903.25) maverick-proposed; urgency=low

  [ Ming Lei ]

  * SAUCE: usb: ehci: make HC see up-to-date qh/qtd descriptor ASAP
- LP: #709245

  [ Upstream Kernel Changes ]

  * cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191
- LP: #834135
- CVE-2011-3191
  * befs: Validate length of long symbolic links, CVE-2011-2928
- LP: #834124
- CVE-2011-2928
  * gro: Only reset frag0 when skb can be pulled, CVE-2011-2723
- LP: #844371
- CVE-2011-2723
  * Validate size of EFI GUID partition entries, CVE-2011-1776
- LP: #844365
- CVE-2011-1776
  * inet_diag: fix inet_diag_bc_audit(), CVE-2011-2213
- LP: #838421
- CVE-2011-2213
  * si4713-i2c: avoid potential buffer overflow on si4713, CVE-2011-2700
- LP: #844370
- CVE-2011-2700
  * Bluetooth: Prevent buffer overflow in l2cap config request,
CVE-2011-2497
- LP: #838423
- CVE-2011-2497
  * core: Fix memory leak/corruption on VLAN GRO_DROP, CVE-2011-1576
- LP: #844361
- CVE-2011-1576
  * crypto: Move md5_transform to lib/md5.c, CVE-2011-3188
- LP: #834129
- CVE-2011-3188
  * net: Compute protocol sequence numbers and fragment IDs using MD5,
CVE-2011-3188
- LP: #834129
- CVE-2011-3188
 -- Paolo Pisati paolo.pis...@canonical.com   Tue, 20 Sep 2011 19:12:28 +0200

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/844371

Title:
  CVE-2011-2723

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/844371/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 844371] Re: CVE-2011-2723

2011-09-29 Thread Marc Deslauriers
** Changed in: linux (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/844371

Title:
  CVE-2011-2723

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/844371/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 844371] Re: CVE-2011-2723

2011-09-26 Thread Marc Deslauriers
** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/844371

Title:
  CVE-2011-2723

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/844371/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 844371] Re: CVE-2011-2723

2011-09-22 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-maverick

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/844371

Title:
  CVE-2011-2723

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/844371/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 844371] Re: CVE-2011-2723

2011-09-21 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/maverick-proposed/linux-ti-omap4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/844371

Title:
  CVE-2011-2723

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/844371/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 844371] Re: CVE-2011-2723

2011-09-19 Thread Marc Deslauriers
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: In Progress = Fix Committed

** Changed in: linux-mvl-dove (Ubuntu Maverick)
   Status: Fix Committed = Fix Released

** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
   Status: In Progress = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/844371

Title:
  CVE-2011-2723

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/844371/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 844371] Re: CVE-2011-2723

2011-09-13 Thread Andy Whitcroft
** Changed in: linux (Ubuntu Oneiric)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Oneiric)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Natty)
   Status: New = In Progress

** Changed in: linux-ti-omap4 (Ubuntu Natty)
 Assignee: (unassigned) = Andy Whitcroft (apw)

** Changed in: linux (Ubuntu Natty)
   Status: New = In Progress

** Changed in: linux (Ubuntu Natty)
 Assignee: (unassigned) = Andy Whitcroft (apw)

** Changed in: linux (Ubuntu Maverick)
   Status: New = In Progress

** Changed in: linux (Ubuntu Maverick)
 Assignee: (unassigned) = Andy Whitcroft (apw)

** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: New = In Progress

** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
   Status: New = In Progress

** Changed in: linux (Ubuntu Lucid)
   Status: New = Fix Committed

** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: New = Fix Committed

** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
   Status: New = In Progress

** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
 Assignee: (unassigned) = Andy Whitcroft (apw)

** Changed in: linux-mvl-dove (Ubuntu Lucid)
   Status: New = In Progress

** Changed in: linux-mvl-dove (Ubuntu Lucid)
   Status: In Progress = Fix Committed

** Changed in: linux-mvl-dove (Ubuntu Maverick)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Maverick)
   Status: New = In Progress

** Changed in: linux-ti-omap4 (Ubuntu Maverick)
 Assignee: (unassigned) = Andy Whitcroft (apw)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/844371

Title:
  CVE-2011-2723

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/844371/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 844371] Re: CVE-2011-2723

2011-09-13 Thread Andy Whitcroft
** Changed in: linux (Ubuntu Hardy)
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/844371

Title:
  CVE-2011-2723

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/844371/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 844371] Re: CVE-2011-2723

2011-09-13 Thread Tim Gardner
** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
   Status: In Progress = Fix Committed

** Changed in: linux (Ubuntu Maverick)
   Status: In Progress = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Maverick)
   Status: In Progress = Fix Committed

** Changed in: linux (Ubuntu Natty)
   Status: In Progress = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Natty)
   Status: In Progress = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/844371

Title:
  CVE-2011-2723

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/844371/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 844371] Re: CVE-2011-2723

2011-09-13 Thread Kees Cook
** Changed in: linux-mvl-dove (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

** Description changed:

  The skb_gro_header_slow function in include/linux/netdevice.h in the
  Linux kernel before 2.6.39.4, when Generic Receive Offload (GRO) is
  enabled, resets certain fields in incorrect situations, which allows
  remote attackers to cause a denial of service (system crash) via crafted
  network traffic.
+ 
+ Break-Fix: 86911732d3996a9da07914b280621450111bb6da
+ 17dd759c67f21e34f2156abcf415e1f60605a188

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/844371

Title:
  CVE-2011-2723

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/844371/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 844371] Re: CVE-2011-2723

2011-09-07 Thread Kees Cook
CVE-2011-2723

** Also affects: linux (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Changed in: linux-ec2 (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-ti-omap4 (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-ti-omap4 (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Natty)
   Status: New = Invalid

** Description changed:

- Placeholder
+ The skb_gro_header_slow function in include/linux/netdevice.h in the
+ Linux kernel before 2.6.39.4, when Generic Receive Offload (GRO) is
+ enabled, resets certain fields in incorrect situations, which allows
+ remote attackers to cause a denial of service (system crash) via crafted
+ network traffic.

** Changed in: linux-ec2 (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-ec2 (Ubuntu Oneiric)
   Importance: Undecided = Medium

** Changed in: