[Bug 866034] Re: CVE-2011-3363

2011-11-23 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 2.6.38-1209.17

---
linux-ti-omap4 (2.6.38-1209.17) natty-proposed; urgency=low

  * Release Tracking Bug
- LP: #888573

  [ Upstream Kernel Changes ]

  * cifs: add fallback in is_path_accessible for old servers, CVE-2011-3363
- LP: #866034
- CVE-2011-3363
  * Make TASKSTATS require root access, CVE-2011-2494
- LP: #866021
- CVE-2011-2494
  * proc: restrict access to /proc/PID/io, CVE-2011-2495
- LP: #866025
- CVE-2011-2495
  * proc: fix a race in do_io_accounting(), CVE-2011-2495
- LP: #866025
- CVE-2011-2495
  * staging: comedi: fix infoleak to userspace, CVE-2011-2909
- LP: #869261
- CVE-2011-2909
  * perf tools: do not look at ./config for configuration, CVE-2011-2905
- LP: #869259
- CVE-2011-2905
  * nl80211: fix overflow in ssid_len - CVE-2011-2517
- LP: #869245
- CVE-2011-2517
  * vm: fix vm_pgoff wrap in upward expansion
- LP: #869243
- CVE-2011-2496
  * mm: thp: fix /dev/zero MAP_PRIVATE and vm_flags cleanups, CVE-2011-2479
- LP: #775809
- CVE-2011-2479
  * ksm: fix NULL pointer dereference in scan_get_next_rmap_item() -
CVE-2011-2183
- LP: #869227
- CVE-2011-2183
  * NLM: Don't hang forever on NLM unlock requests - CVE-2011-2491
- LP: #869237
- CVE-2011-2491
 -- Paolo PisatiFri, 11 Nov 2011 14:41:44 +0100

** Changed in: linux-ti-omap4 (Ubuntu Natty)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2479

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/866034

Title:
  CVE-2011-3363

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 866034] Re: CVE-2011-3363

2011-11-09 Thread Marc Deslauriers
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/866034

Title:
  CVE-2011-3363

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 866034] Re: CVE-2011-3363

2011-10-25 Thread Marc Deslauriers
** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric)
   Status: New => Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric)
   Importance: Undecided => Medium

** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
   Importance: Undecided => Medium

** Changed in: linux-lts-backport-oneiric (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy)
   Status: New => Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy)
   Importance: Undecided => Medium

** Changed in: linux-lts-backport-oneiric (Ubuntu Maverick)
   Status: New => Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Maverick)
   Importance: Undecided => Medium

** Changed in: linux-lts-backport-oneiric (Ubuntu Natty)
   Status: New => Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Natty)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/866034

Title:
  CVE-2011-3363

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 866034] Re: CVE-2011-3363

2011-10-24 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-fsl-imx51 - 2.6.31-611.29

---
linux-fsl-imx51 (2.6.31-611.29) lucid-proposed; urgency=low

  * Release tracking bug
- LP: #873059

  [ Upstream Kernel Changes ]

  * cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191
- LP: #834135
- CVE-2011-3191
  * befs: Validate length of long symbolic links, CVE-2011-2928
- LP: #834124
- CVE-2011-2928
  * gro: Only reset frag0 when skb can be pulled, CVE-2011-2723
- LP: #844371
- CVE-2011-2723
  * Validate size of EFI GUID partition entries, CVE-2011-1776
- LP: #844365
- CVE-2011-1776
  * inet_diag: fix inet_diag_bc_audit(), CVE-2011-2213
- LP: #838421
- CVE-2011-2213
  * Bluetooth: Prevent buffer overflow in l2cap config request,
CVE-2011-2497
- LP: #838423
- CVE-2011-2497
  * core: Fix memory leak/corruption on VLAN GRO_DROP, CVE-2011-1576
- LP: #844361
- CVE-2011-1576
  * crypto: Move md5_transform to lib/md5.c, CVE-2011-3188
- LP: #827462, #834129
- CVE-2011-3188
  * net: Compute protocol sequence numbers and fragment IDs using MD5,
CVE-2011-3188
- LP: #827462, #834129
- CVE-2011-3188
  * ext4: correctly calculate number of blocks for fiemap, CVE-2011-2695
- LP: #474597, #583414, #819574
- CVE-2011-2695
  * ext4: Fix max file size and logical block counting of extent format
file, CVE-2011-2695
- LP: #819574
- CVE-2011-2695
  * cifs: always do is_path_accessible check in cifs_mount, CVE-2011-3363
- LP: #866034
- CVE-2011-3363
  * cifs: add fallback in is_path_accessible for old servers, CVE-2011-3363
- LP: #866034
- CVE-2011-3363
  * Make TASKSTATS require root access, CVE-2011-2494
- LP: #866021
- CVE-2011-2494
  * proc: restrict access to /proc/PID/io, CVE-2011-2495
- LP: #866025
- CVE-2011-2495
  * proc: fix a race in do_io_accounting(), CVE-2011-2495
- LP: #866025
- CVE-2011-2495
  * staging: comedi: fix infoleak to userspace, CVE-2011-2909
- LP: #869261
- CVE-2011-2909
  * sctp: fix to calc the INIT/INIT-ACK chunk length correctly is set,
CVE-2011-1573
- LP: #869205
- CVE-2011-1573
  * perf tools: do not look at ./config for configuration, CVE-2011-2905
- LP: #869259
- CVE-2011-2905
  * net_sched: Fix qdisc_notify() - CVE-2011-2525
- LP: #869250
- CVE-2011-2525
  * nl80211: fix overflow in ssid_len - CVE-2011-2517
- LP: #869245
- CVE-2011-2517
  * mm: avoid wrapping vm_pgoff in mremap() - CVE-2011-2496
- LP: #869243
- CVE-2011-2496
  * vm: fix vm_pgoff wrap in stack expansion - CVE-2011-2496
- LP: #869243
- CVE-2011-2496
  * vm: fix vm_pgoff wrap in upward expansion - CVE-2011-2496
- LP: #869243
- CVE-2011-2496
 -- Paolo PisatiThu, 13 Oct 2011 12:19:09 +0200

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/866034

Title:
  CVE-2011-3363

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 866034] Re: CVE-2011-3363

2011-10-24 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-backport-maverick -
2.6.35-30.61~lucid1

---
linux-lts-backport-maverick (2.6.35-30.61~lucid1) lucid-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #872660

  [ Stefan Bader ]

  * [Config] Include all filesystem modules for virtual
- LP: #761809

  [ Upstream Kernel Changes ]

  * crypto: Move md5_transform to lib/md5.c, CVE-2011-3188
- LP: #834129
- CVE-2011-3188
  * net: Compute protocol sequence numbers and fragment IDs using MD5,
CVE-2011-3188
- LP: #834129
- CVE-2011-3188
  * ext4: Fix max file size and logical block counting of extent format
file, CVE-2011-2695
- LP: #819574
- CVE-2011-2695
  * cifs: add fallback in is_path_accessible for old servers, CVE-2011-3363
- LP: #866034
- CVE-2011-3363
  * Make TASKSTATS require root access, CVE-2011-2494
- LP: #866021
- CVE-2011-2494
  * proc: restrict access to /proc/PID/io, CVE-2011-2495
- LP: #866025
- CVE-2011-2495
  * proc: fix a race in do_io_accounting(), CVE-2011-2495
- LP: #866025
- CVE-2011-2495
  * inotify: fix double free/corruption of stuct user
- LP: #869203
- CVE-2011-1479
  * staging: comedi: fix infoleak to userspace, CVE-2011-2909
- LP: #869261
- CVE-2011-2909
  * perf tools: do not look at ./config for configuration, CVE-2011-2905
- LP: #869259
- CVE-2011-2905

linux (2.6.35-30.60) maverick-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #854092

  [ Stefan Bader ]

  * [Config] Force perf to use libiberty for demangling
- LP: #783660

  [ Tim Gardner ]

  * [Config] Simplify binary-udebs dependencies
  * [Config] kernel preparation cannot be parallelized
  * [Config] Linearize module/abi checks
  * [Config] Linearize and simplify tree preparation rules
  * [Config] Build kernel image in parallel with modules
  * [Config] Set concurrency for kmake invocations
  * [Config] Improve install-arch-headers speed
  * [Config] Fix binary-perarch dependencies
  * [Config] Removed stamp-flavours target
  * [Config] Serialize binary indep targets
  * [Config] Use build stamp directly
  * [Config] Restore prepare-% target
  * [Config] Fix binary-% build target

  [ Upstream Kernel Changes ]

  * Add mount option to check uid of device being mounted = expect uid,
CVE-2011-1833
- LP: #732628
- CVE-2011-1833
  * ipv6: make fragment identifications less predictable, CVE-2011-2699
- LP: #827685
- CVE-2011-2699
  * perf: Fix software event overflow, CVE-2011-2918
- LP: #834121
- CVE-2011-2918
  * cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191
- LP: #834135
- CVE-2011-3191
  * befs: Validate length of long symbolic links, CVE-2011-2928
- LP: #834124
- CVE-2011-2928
  * gro: Only reset frag0 when skb can be pulled, CVE-2011-2723
- LP: #844371
- CVE-2011-2723
  * Validate size of EFI GUID partition entries, CVE-2011-1776
- LP: #844365
- CVE-2011-1776
  * inet_diag: fix inet_diag_bc_audit(), CVE-2011-2213
- LP: #838421
- CVE-2011-2213
  * si4713-i2c: avoid potential buffer overflow on si4713, CVE-2011-2700
- LP: #844370
- CVE-2011-2700
  * Bluetooth: Prevent buffer overflow in l2cap config request,
CVE-2011-2497
- LP: #838423
- CVE-2011-2497
  * core: Fix memory leak/corruption on VLAN GRO_DROP, CVE-2011-1576
- LP: #844361
- CVE-2011-1576
 -- Herton Ronaldo KrzesinskiThu, 13 Oct 
2011 14:45:27 -0300

** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1573

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2525

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/866034

Title:
  CVE-2011-3363

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 866034] Re: CVE-2011-3363

2011-10-24 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.26

---
linux-ti-omap4 (2.6.35-903.26) maverick-proposed; urgency=low

  * Release tracking bug
- LP: #872658

  [ Upstream Kernel Changes ]

  * ext4: Fix max file size and logical block counting of extent format
file, CVE-2011-2695
- LP: #819574
- CVE-2011-2695
  * memory corruption in X.25 facilities parsing, CVE-2010-3873
- LP: #709372
- CVE-2010-3873
  * cifs: always do is_path_accessible check in cifs_mount, CVE-2011-3363
- LP: #866034
- CVE-2011-3363
  * cifs: add fallback in is_path_accessible for old servers, CVE-2011-3363
- LP: #866034
- CVE-2011-3363
  * Make TASKSTATS require root access, CVE-2011-2494
- LP: #866021
- CVE-2011-2494
  * proc: restrict access to /proc/PID/io, CVE-2011-2495
- LP: #866025
- CVE-2011-2495
  * proc: fix a race in do_io_accounting(), CVE-2011-2495
- LP: #866025
- CVE-2011-2495
  * staging: comedi: fix infoleak to userspace, CVE-2011-2909
- LP: #869261
- CVE-2011-2909
  * perf tools: do not look at ./config for configuration, CVE-2011-2905
- LP: #869259
- CVE-2011-2905
  * nl80211: fix overflow in ssid_len - CVE-2011-2517
- LP: #869245
- CVE-2011-2517
  * vm: fix vm_pgoff wrap in stack expansion - CVE-2011-2496
- LP: #869243
- CVE-2011-2496
  * vm: fix vm_pgoff wrap in upward expansion - CVE-2011-2496
- LP: #869243
- CVE-2011-2496
  * ksm: fix NULL pointer dereference in scan_get_next_rmap_item() -
CVE-2011-2183
- LP: #869227
- CVE-2011-2183
  * NLM: Don't hang forever on NLM unlock requests - CVE-2011-2491
- LP: #869237
- CVE-2011-2491
 -- Paolo PisatiTue, 18 Oct 2011 13:35:51 +0200

** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1576

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1776

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1833

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2213

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2497

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2699

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2700

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2723

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2918

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2928

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3191

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/866034

Title:
  CVE-2011-3363

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 866034] Re: CVE-2011-3363

2011-10-24 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.35-30.61

---
linux (2.6.35-30.61) maverick-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #871912

  [ Stefan Bader ]

  * [Config] Include all filesystem modules for virtual
- LP: #761809

  [ Upstream Kernel Changes ]

  * crypto: Move md5_transform to lib/md5.c, CVE-2011-3188
- LP: #834129
- CVE-2011-3188
  * net: Compute protocol sequence numbers and fragment IDs using MD5,
CVE-2011-3188
- LP: #834129
- CVE-2011-3188
  * ext4: Fix max file size and logical block counting of extent format
file, CVE-2011-2695
- LP: #819574
- CVE-2011-2695
  * cifs: add fallback in is_path_accessible for old servers, CVE-2011-3363
- LP: #866034
- CVE-2011-3363
  * Make TASKSTATS require root access, CVE-2011-2494
- LP: #866021
- CVE-2011-2494
  * proc: restrict access to /proc/PID/io, CVE-2011-2495
- LP: #866025
- CVE-2011-2495
  * proc: fix a race in do_io_accounting(), CVE-2011-2495
- LP: #866025
- CVE-2011-2495
  * inotify: fix double free/corruption of stuct user
- LP: #869203
- CVE-2011-1479
  * staging: comedi: fix infoleak to userspace, CVE-2011-2909
- LP: #869261
- CVE-2011-2909
  * perf tools: do not look at ./config for configuration, CVE-2011-2905
- LP: #869259
- CVE-2011-2905
 -- Herton Ronaldo KrzesinskiMon, 10 Oct 
2011 14:37:08 -0300

** Changed in: linux (Ubuntu Maverick)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1479

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2494

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2495

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2695

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2905

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2909

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3188

** Changed in: linux-ti-omap4 (Ubuntu Maverick)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3873

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2183

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2491

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2496

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2517

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/866034

Title:
  CVE-2011-3363

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 866034] Re: CVE-2011-3363

2011-10-20 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/maverick-proposed/linux-ti-omap4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/866034

Title:
  CVE-2011-3363

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 866034] Re: CVE-2011-3363

2011-10-20 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-maverick

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/866034

Title:
  CVE-2011-3363

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 866034] Re: CVE-2011-3363

2011-10-14 Thread Marc Deslauriers
** Also affects: linux (Ubuntu Precise)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Precise)
   Importance: Medium
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Precise)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Precise)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Precise)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Precise)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Precise)
   Importance: Medium
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/866034

Title:
  CVE-2011-3363

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 866034] Re: CVE-2011-3363

2011-10-05 Thread Marc Deslauriers
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/866034

Title:
  CVE-2011-3363

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 866034] Re: CVE-2011-3363

2011-10-04 Thread Tim Gardner
** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
   Status: In Progress => Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Maverick)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Maverick)
   Status: In Progress => Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Natty)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/866034

Title:
  CVE-2011-3363

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 866034] Re: CVE-2011-3363

2011-10-04 Thread Andy Whitcroft
** Changed in: linux (Ubuntu Maverick)
   Status: New => In Progress

** Changed in: linux (Ubuntu Maverick)
 Assignee: (unassigned) => Andy Whitcroft (apw)

** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
   Status: New => In Progress

** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
 Assignee: (unassigned) => Andy Whitcroft (apw)

** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
   Status: New => In Progress

** Changed in: linux-ti-omap4 (Ubuntu Maverick)
   Status: New => In Progress

** Changed in: linux-ti-omap4 (Ubuntu Maverick)
 Assignee: (unassigned) => Andy Whitcroft (apw)

** Changed in: linux-ti-omap4 (Ubuntu Natty)
   Status: New => In Progress

** Changed in: linux-ti-omap4 (Ubuntu Natty)
 Assignee: (unassigned) => Andy Whitcroft (apw)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/866034

Title:
  CVE-2011-3363

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 866034] Re: CVE-2011-3363

2011-10-04 Thread Marc Deslauriers
** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: Fix Committed => Fix Released

** Changed in: linux-mvl-dove (Ubuntu Lucid)
   Status: Fix Committed => Fix Released

** Changed in: linux-mvl-dove (Ubuntu Maverick)
   Status: Fix Committed => Fix Released

** Changed in: linux (Ubuntu Lucid)
   Status: Fix Committed => Fix Released

** Changed in: linux (Ubuntu Natty)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/866034

Title:
  CVE-2011-3363

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 866034] Re: CVE-2011-3363

2011-10-04 Thread Marc Deslauriers
** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: New => Fix Committed

** Changed in: linux-ec2 (Ubuntu Oneiric)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Hardy)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Natty)
   Status: New => Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: New => Fix Committed

** Changed in: linux-lts-backport-natty (Ubuntu Oneiric)
   Status: New => Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Hardy)
   Status: New => Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Maverick)
   Status: New => Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Natty)
   Status: New => Invalid

** Changed in: linux-mvl-dove (Ubuntu Lucid)
   Status: New => Fix Committed

** Changed in: linux-mvl-dove (Ubuntu Oneiric)
   Status: New => Invalid

** Changed in: linux-mvl-dove (Ubuntu Hardy)
   Status: New => Invalid

** Changed in: linux-mvl-dove (Ubuntu Maverick)
   Status: New => Fix Committed

** Changed in: linux-mvl-dove (Ubuntu Natty)
   Status: New => Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Oneiric)
   Status: New => Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Hardy)
   Status: New => Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Maverick)
   Status: New => Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Natty)
   Status: New => Invalid

** Changed in: linux (Ubuntu Lucid)
   Status: New => Fix Committed

** Changed in: linux (Ubuntu Oneiric)
   Status: New => Invalid

** Changed in: linux (Ubuntu Hardy)
   Status: New => Invalid

** Changed in: linux (Ubuntu Natty)
   Status: New => Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux-ti-omap4 (Ubuntu Oneiric)
   Status: New => Invalid

** Changed in: linux-ti-omap4 (Ubuntu Hardy)
   Status: New => Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Oneiric)
   Status: New => Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Hardy)
   Status: New => Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Maverick)
   Status: New => Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Natty)
   Status: New => Invalid

** Description changed:

- Placeholder
+ Currently, we skip doing the is_path_accessible check in cifs_mount if
+ there is no prefixpath. There is a report of at least one server however
+ that allows a TREE_CONNECT to a share that has a DFS referral at its
+ root. UNC that had no prefixpath was used in that case, so the
+ is_path_accessible check was not triggered and the box later hit a BUG()
+ because we were chasing a DFS referral on the root dentry for the mount.
+ 
+ Break-Fix: e4cce94c9c8797b08faf6a79396df4d175e377fa 
70945643722ffeac779d2529a348f99567fa5c33
+ Break-Fix: e4cce94c9c8797b08faf6a79396df4d175e377fa 
221d1d797202984cb874e3ed9f1388593d34ee22

** Changed in: linux-ec2 (Ubuntu Lucid)
   Importance: Undecided => Medium

** Changed in: linux-ec2 (Ubuntu Oneiric)
   Importance: Undecided => Medium

** Changed in: linux-ec2 (Ubuntu Hardy)
   Importance: Undecided => Medium

** Changed in: linux-ec2 (Ubuntu Maverick)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Maverick)
   Importance: Undecided => Medium

** Changed in: linux-ec2 (Ubuntu Natty)
   Importance: Undecided => Medium

** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Importance: Undecided => Medium

** Changed in: linux-lts-backport-natty (Ubuntu Oneiric)
   Importance: Undecided => Medium

** Changed in: linux-lts-backport-natty (Ubuntu Hardy)
   Importance: Undecided => Medium

** Changed in: linux-lts-backport-natty (Ubuntu Maverick)
   Importance: Undecided => Medium

** Changed in: linux-lts-backport-natty (Ubuntu Natty)
   Importance: Undecided => Medium

** Changed in: linux-mvl-dove (Ubuntu Lucid)
   Importance: Undecided => Medium

** Changed in: linux-mvl-dove (Ubuntu Oneiric)
   Importance: Undecided => Medium

** Changed in: linux-mvl-dove (Ubuntu Hardy)
   Importance: Undecided => Medium

** Changed in: linux-mvl-dove (Ubuntu Maverick)
   Importance: Undecided => Medium

** Changed in: linux-mvl-dove (Ubuntu Natty)
   Importance: Undecided => Medium

** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
   Importance: Undecided => Medium

** Changed in: linux-lts-backport-maverick (Ubuntu Oneiric)
   Importance: Undecided => Medium

** Changed in: linux-lts-backport-maverick (Ubuntu Hardy)
   Importance: Undecided => Medium

** Changed in: linux-lts-backport-maverick (Ubuntu Maverick)
   Importance: Undecided => Medium

** Changed in: linux-lts-backport-maverick (Ubuntu Natty)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Lucid)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Oneiric)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Hardy)
   Importance: Undecided => 

[Bug 866034] Re: CVE-2011-3363

2011-10-04 Thread Andy Whitcroft
CVE-2011-3363

** Also affects: linux (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/866034

Title:
  CVE-2011-3363

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs