[Bug 866034] Re: CVE-2011-3363
This bug was fixed in the package linux-ti-omap4 - 2.6.38-1209.17 --- linux-ti-omap4 (2.6.38-1209.17) natty-proposed; urgency=low * Release Tracking Bug - LP: #888573 [ Upstream Kernel Changes ] * cifs: add fallback in is_path_accessible for old servers, CVE-2011-3363 - LP: #866034 - CVE-2011-3363 * Make TASKSTATS require root access, CVE-2011-2494 - LP: #866021 - CVE-2011-2494 * proc: restrict access to /proc/PID/io, CVE-2011-2495 - LP: #866025 - CVE-2011-2495 * proc: fix a race in do_io_accounting(), CVE-2011-2495 - LP: #866025 - CVE-2011-2495 * staging: comedi: fix infoleak to userspace, CVE-2011-2909 - LP: #869261 - CVE-2011-2909 * perf tools: do not look at ./config for configuration, CVE-2011-2905 - LP: #869259 - CVE-2011-2905 * nl80211: fix overflow in ssid_len - CVE-2011-2517 - LP: #869245 - CVE-2011-2517 * vm: fix vm_pgoff wrap in upward expansion - LP: #869243 - CVE-2011-2496 * mm: thp: fix /dev/zero MAP_PRIVATE and vm_flags cleanups, CVE-2011-2479 - LP: #775809 - CVE-2011-2479 * ksm: fix NULL pointer dereference in scan_get_next_rmap_item() - CVE-2011-2183 - LP: #869227 - CVE-2011-2183 * NLM: Don't hang forever on NLM unlock requests - CVE-2011-2491 - LP: #869237 - CVE-2011-2491 -- Paolo PisatiFri, 11 Nov 2011 14:41:44 +0100 ** Changed in: linux-ti-omap4 (Ubuntu Natty) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2479 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/866034 Title: CVE-2011-3363 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 866034] Re: CVE-2011-3363
** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/866034 Title: CVE-2011-3363 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 866034] Re: CVE-2011-3363
** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric) Importance: Undecided => Medium ** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-lts-backport-oneiric (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy) Importance: Undecided => Medium ** Changed in: linux-lts-backport-oneiric (Ubuntu Maverick) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Maverick) Importance: Undecided => Medium ** Changed in: linux-lts-backport-oneiric (Ubuntu Natty) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Natty) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/866034 Title: CVE-2011-3363 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 866034] Re: CVE-2011-3363
This bug was fixed in the package linux-fsl-imx51 - 2.6.31-611.29 --- linux-fsl-imx51 (2.6.31-611.29) lucid-proposed; urgency=low * Release tracking bug - LP: #873059 [ Upstream Kernel Changes ] * cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191 - LP: #834135 - CVE-2011-3191 * befs: Validate length of long symbolic links, CVE-2011-2928 - LP: #834124 - CVE-2011-2928 * gro: Only reset frag0 when skb can be pulled, CVE-2011-2723 - LP: #844371 - CVE-2011-2723 * Validate size of EFI GUID partition entries, CVE-2011-1776 - LP: #844365 - CVE-2011-1776 * inet_diag: fix inet_diag_bc_audit(), CVE-2011-2213 - LP: #838421 - CVE-2011-2213 * Bluetooth: Prevent buffer overflow in l2cap config request, CVE-2011-2497 - LP: #838423 - CVE-2011-2497 * core: Fix memory leak/corruption on VLAN GRO_DROP, CVE-2011-1576 - LP: #844361 - CVE-2011-1576 * crypto: Move md5_transform to lib/md5.c, CVE-2011-3188 - LP: #827462, #834129 - CVE-2011-3188 * net: Compute protocol sequence numbers and fragment IDs using MD5, CVE-2011-3188 - LP: #827462, #834129 - CVE-2011-3188 * ext4: correctly calculate number of blocks for fiemap, CVE-2011-2695 - LP: #474597, #583414, #819574 - CVE-2011-2695 * ext4: Fix max file size and logical block counting of extent format file, CVE-2011-2695 - LP: #819574 - CVE-2011-2695 * cifs: always do is_path_accessible check in cifs_mount, CVE-2011-3363 - LP: #866034 - CVE-2011-3363 * cifs: add fallback in is_path_accessible for old servers, CVE-2011-3363 - LP: #866034 - CVE-2011-3363 * Make TASKSTATS require root access, CVE-2011-2494 - LP: #866021 - CVE-2011-2494 * proc: restrict access to /proc/PID/io, CVE-2011-2495 - LP: #866025 - CVE-2011-2495 * proc: fix a race in do_io_accounting(), CVE-2011-2495 - LP: #866025 - CVE-2011-2495 * staging: comedi: fix infoleak to userspace, CVE-2011-2909 - LP: #869261 - CVE-2011-2909 * sctp: fix to calc the INIT/INIT-ACK chunk length correctly is set, CVE-2011-1573 - LP: #869205 - CVE-2011-1573 * perf tools: do not look at ./config for configuration, CVE-2011-2905 - LP: #869259 - CVE-2011-2905 * net_sched: Fix qdisc_notify() - CVE-2011-2525 - LP: #869250 - CVE-2011-2525 * nl80211: fix overflow in ssid_len - CVE-2011-2517 - LP: #869245 - CVE-2011-2517 * mm: avoid wrapping vm_pgoff in mremap() - CVE-2011-2496 - LP: #869243 - CVE-2011-2496 * vm: fix vm_pgoff wrap in stack expansion - CVE-2011-2496 - LP: #869243 - CVE-2011-2496 * vm: fix vm_pgoff wrap in upward expansion - CVE-2011-2496 - LP: #869243 - CVE-2011-2496 -- Paolo PisatiThu, 13 Oct 2011 12:19:09 +0200 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/866034 Title: CVE-2011-3363 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 866034] Re: CVE-2011-3363
This bug was fixed in the package linux-lts-backport-maverick - 2.6.35-30.61~lucid1 --- linux-lts-backport-maverick (2.6.35-30.61~lucid1) lucid-proposed; urgency=low [Herton R. Krzesinski] * Release Tracking Bug - LP: #872660 [ Stefan Bader ] * [Config] Include all filesystem modules for virtual - LP: #761809 [ Upstream Kernel Changes ] * crypto: Move md5_transform to lib/md5.c, CVE-2011-3188 - LP: #834129 - CVE-2011-3188 * net: Compute protocol sequence numbers and fragment IDs using MD5, CVE-2011-3188 - LP: #834129 - CVE-2011-3188 * ext4: Fix max file size and logical block counting of extent format file, CVE-2011-2695 - LP: #819574 - CVE-2011-2695 * cifs: add fallback in is_path_accessible for old servers, CVE-2011-3363 - LP: #866034 - CVE-2011-3363 * Make TASKSTATS require root access, CVE-2011-2494 - LP: #866021 - CVE-2011-2494 * proc: restrict access to /proc/PID/io, CVE-2011-2495 - LP: #866025 - CVE-2011-2495 * proc: fix a race in do_io_accounting(), CVE-2011-2495 - LP: #866025 - CVE-2011-2495 * inotify: fix double free/corruption of stuct user - LP: #869203 - CVE-2011-1479 * staging: comedi: fix infoleak to userspace, CVE-2011-2909 - LP: #869261 - CVE-2011-2909 * perf tools: do not look at ./config for configuration, CVE-2011-2905 - LP: #869259 - CVE-2011-2905 linux (2.6.35-30.60) maverick-proposed; urgency=low [Herton R. Krzesinski] * Release Tracking Bug - LP: #854092 [ Stefan Bader ] * [Config] Force perf to use libiberty for demangling - LP: #783660 [ Tim Gardner ] * [Config] Simplify binary-udebs dependencies * [Config] kernel preparation cannot be parallelized * [Config] Linearize module/abi checks * [Config] Linearize and simplify tree preparation rules * [Config] Build kernel image in parallel with modules * [Config] Set concurrency for kmake invocations * [Config] Improve install-arch-headers speed * [Config] Fix binary-perarch dependencies * [Config] Removed stamp-flavours target * [Config] Serialize binary indep targets * [Config] Use build stamp directly * [Config] Restore prepare-% target * [Config] Fix binary-% build target [ Upstream Kernel Changes ] * Add mount option to check uid of device being mounted = expect uid, CVE-2011-1833 - LP: #732628 - CVE-2011-1833 * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191 - LP: #834135 - CVE-2011-3191 * befs: Validate length of long symbolic links, CVE-2011-2928 - LP: #834124 - CVE-2011-2928 * gro: Only reset frag0 when skb can be pulled, CVE-2011-2723 - LP: #844371 - CVE-2011-2723 * Validate size of EFI GUID partition entries, CVE-2011-1776 - LP: #844365 - CVE-2011-1776 * inet_diag: fix inet_diag_bc_audit(), CVE-2011-2213 - LP: #838421 - CVE-2011-2213 * si4713-i2c: avoid potential buffer overflow on si4713, CVE-2011-2700 - LP: #844370 - CVE-2011-2700 * Bluetooth: Prevent buffer overflow in l2cap config request, CVE-2011-2497 - LP: #838423 - CVE-2011-2497 * core: Fix memory leak/corruption on VLAN GRO_DROP, CVE-2011-1576 - LP: #844361 - CVE-2011-1576 -- Herton Ronaldo KrzesinskiThu, 13 Oct 2011 14:45:27 -0300 ** Changed in: linux-fsl-imx51 (Ubuntu Lucid) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1573 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2525 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/866034 Title: CVE-2011-3363 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 866034] Re: CVE-2011-3363
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.26 --- linux-ti-omap4 (2.6.35-903.26) maverick-proposed; urgency=low * Release tracking bug - LP: #872658 [ Upstream Kernel Changes ] * ext4: Fix max file size and logical block counting of extent format file, CVE-2011-2695 - LP: #819574 - CVE-2011-2695 * memory corruption in X.25 facilities parsing, CVE-2010-3873 - LP: #709372 - CVE-2010-3873 * cifs: always do is_path_accessible check in cifs_mount, CVE-2011-3363 - LP: #866034 - CVE-2011-3363 * cifs: add fallback in is_path_accessible for old servers, CVE-2011-3363 - LP: #866034 - CVE-2011-3363 * Make TASKSTATS require root access, CVE-2011-2494 - LP: #866021 - CVE-2011-2494 * proc: restrict access to /proc/PID/io, CVE-2011-2495 - LP: #866025 - CVE-2011-2495 * proc: fix a race in do_io_accounting(), CVE-2011-2495 - LP: #866025 - CVE-2011-2495 * staging: comedi: fix infoleak to userspace, CVE-2011-2909 - LP: #869261 - CVE-2011-2909 * perf tools: do not look at ./config for configuration, CVE-2011-2905 - LP: #869259 - CVE-2011-2905 * nl80211: fix overflow in ssid_len - CVE-2011-2517 - LP: #869245 - CVE-2011-2517 * vm: fix vm_pgoff wrap in stack expansion - CVE-2011-2496 - LP: #869243 - CVE-2011-2496 * vm: fix vm_pgoff wrap in upward expansion - CVE-2011-2496 - LP: #869243 - CVE-2011-2496 * ksm: fix NULL pointer dereference in scan_get_next_rmap_item() - CVE-2011-2183 - LP: #869227 - CVE-2011-2183 * NLM: Don't hang forever on NLM unlock requests - CVE-2011-2491 - LP: #869237 - CVE-2011-2491 -- Paolo PisatiTue, 18 Oct 2011 13:35:51 +0200 ** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1576 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1776 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1833 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2213 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2497 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2699 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2700 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2723 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2918 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2928 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-3191 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/866034 Title: CVE-2011-3363 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 866034] Re: CVE-2011-3363
This bug was fixed in the package linux - 2.6.35-30.61 --- linux (2.6.35-30.61) maverick-proposed; urgency=low [Herton R. Krzesinski] * Release Tracking Bug - LP: #871912 [ Stefan Bader ] * [Config] Include all filesystem modules for virtual - LP: #761809 [ Upstream Kernel Changes ] * crypto: Move md5_transform to lib/md5.c, CVE-2011-3188 - LP: #834129 - CVE-2011-3188 * net: Compute protocol sequence numbers and fragment IDs using MD5, CVE-2011-3188 - LP: #834129 - CVE-2011-3188 * ext4: Fix max file size and logical block counting of extent format file, CVE-2011-2695 - LP: #819574 - CVE-2011-2695 * cifs: add fallback in is_path_accessible for old servers, CVE-2011-3363 - LP: #866034 - CVE-2011-3363 * Make TASKSTATS require root access, CVE-2011-2494 - LP: #866021 - CVE-2011-2494 * proc: restrict access to /proc/PID/io, CVE-2011-2495 - LP: #866025 - CVE-2011-2495 * proc: fix a race in do_io_accounting(), CVE-2011-2495 - LP: #866025 - CVE-2011-2495 * inotify: fix double free/corruption of stuct user - LP: #869203 - CVE-2011-1479 * staging: comedi: fix infoleak to userspace, CVE-2011-2909 - LP: #869261 - CVE-2011-2909 * perf tools: do not look at ./config for configuration, CVE-2011-2905 - LP: #869259 - CVE-2011-2905 -- Herton Ronaldo KrzesinskiMon, 10 Oct 2011 14:37:08 -0300 ** Changed in: linux (Ubuntu Maverick) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1479 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2494 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2495 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2695 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2905 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2909 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-3188 ** Changed in: linux-ti-omap4 (Ubuntu Maverick) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-3873 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2183 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2491 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2496 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2517 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/866034 Title: CVE-2011-3363 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 866034] Re: CVE-2011-3363
** Branch linked: lp:ubuntu/maverick-proposed/linux-ti-omap4 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/866034 Title: CVE-2011-3363 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 866034] Re: CVE-2011-3363
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-maverick -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/866034 Title: CVE-2011-3363 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 866034] Re: CVE-2011-3363
** Also affects: linux (Ubuntu Precise) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Precise) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Precise) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Precise) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Precise) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Precise) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Precise) Importance: Medium Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/866034 Title: CVE-2011-3363 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 866034] Re: CVE-2011-3363
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/866034 Title: CVE-2011-3363 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 866034] Re: CVE-2011-3363
** Changed in: linux-fsl-imx51 (Ubuntu Lucid) Status: In Progress => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Maverick) Status: In Progress => Fix Committed ** Changed in: linux (Ubuntu Maverick) Status: In Progress => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Natty) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/866034 Title: CVE-2011-3363 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 866034] Re: CVE-2011-3363
** Changed in: linux (Ubuntu Maverick) Status: New => In Progress ** Changed in: linux (Ubuntu Maverick) Assignee: (unassigned) => Andy Whitcroft (apw) ** Changed in: linux-fsl-imx51 (Ubuntu Lucid) Status: New => In Progress ** Changed in: linux-fsl-imx51 (Ubuntu Lucid) Assignee: (unassigned) => Andy Whitcroft (apw) ** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New => In Progress ** Changed in: linux-ti-omap4 (Ubuntu Maverick) Status: New => In Progress ** Changed in: linux-ti-omap4 (Ubuntu Maverick) Assignee: (unassigned) => Andy Whitcroft (apw) ** Changed in: linux-ti-omap4 (Ubuntu Natty) Status: New => In Progress ** Changed in: linux-ti-omap4 (Ubuntu Natty) Assignee: (unassigned) => Andy Whitcroft (apw) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/866034 Title: CVE-2011-3363 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 866034] Re: CVE-2011-3363
** Changed in: linux-ec2 (Ubuntu Lucid) Status: Fix Committed => Fix Released ** Changed in: linux-mvl-dove (Ubuntu Lucid) Status: Fix Committed => Fix Released ** Changed in: linux-mvl-dove (Ubuntu Maverick) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Lucid) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Natty) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/866034 Title: CVE-2011-3363 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 866034] Re: CVE-2011-3363
** Changed in: linux-ec2 (Ubuntu Lucid) Status: New => Fix Committed ** Changed in: linux-ec2 (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Natty) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New => Fix Committed ** Changed in: linux-lts-backport-natty (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Maverick) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Natty) Status: New => Invalid ** Changed in: linux-mvl-dove (Ubuntu Lucid) Status: New => Fix Committed ** Changed in: linux-mvl-dove (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-mvl-dove (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-mvl-dove (Ubuntu Maverick) Status: New => Fix Committed ** Changed in: linux-mvl-dove (Ubuntu Natty) Status: New => Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Maverick) Status: New => Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Natty) Status: New => Invalid ** Changed in: linux (Ubuntu Lucid) Status: New => Fix Committed ** Changed in: linux (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux (Ubuntu Natty) Status: New => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Maverick) Status: New => Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Natty) Status: New => Invalid ** Description changed: - Placeholder + Currently, we skip doing the is_path_accessible check in cifs_mount if + there is no prefixpath. There is a report of at least one server however + that allows a TREE_CONNECT to a share that has a DFS referral at its + root. UNC that had no prefixpath was used in that case, so the + is_path_accessible check was not triggered and the box later hit a BUG() + because we were chasing a DFS referral on the root dentry for the mount. + + Break-Fix: e4cce94c9c8797b08faf6a79396df4d175e377fa 70945643722ffeac779d2529a348f99567fa5c33 + Break-Fix: e4cce94c9c8797b08faf6a79396df4d175e377fa 221d1d797202984cb874e3ed9f1388593d34ee22 ** Changed in: linux-ec2 (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-ec2 (Ubuntu Oneiric) Importance: Undecided => Medium ** Changed in: linux-ec2 (Ubuntu Hardy) Importance: Undecided => Medium ** Changed in: linux-ec2 (Ubuntu Maverick) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Maverick) Importance: Undecided => Medium ** Changed in: linux-ec2 (Ubuntu Natty) Importance: Undecided => Medium ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-lts-backport-natty (Ubuntu Oneiric) Importance: Undecided => Medium ** Changed in: linux-lts-backport-natty (Ubuntu Hardy) Importance: Undecided => Medium ** Changed in: linux-lts-backport-natty (Ubuntu Maverick) Importance: Undecided => Medium ** Changed in: linux-lts-backport-natty (Ubuntu Natty) Importance: Undecided => Medium ** Changed in: linux-mvl-dove (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-mvl-dove (Ubuntu Oneiric) Importance: Undecided => Medium ** Changed in: linux-mvl-dove (Ubuntu Hardy) Importance: Undecided => Medium ** Changed in: linux-mvl-dove (Ubuntu Maverick) Importance: Undecided => Medium ** Changed in: linux-mvl-dove (Ubuntu Natty) Importance: Undecided => Medium ** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-lts-backport-maverick (Ubuntu Oneiric) Importance: Undecided => Medium ** Changed in: linux-lts-backport-maverick (Ubuntu Hardy) Importance: Undecided => Medium ** Changed in: linux-lts-backport-maverick (Ubuntu Maverick) Importance: Undecided => Medium ** Changed in: linux-lts-backport-maverick (Ubuntu Natty) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Oneiric) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Hardy) Importance: Undecided =>
[Bug 866034] Re: CVE-2011-3363
CVE-2011-3363 ** Also affects: linux (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Hardy) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/866034 Title: CVE-2011-3363 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/866034/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs