This bug was fixed in the package linux - 2.6.35-22.34
---
linux (2.6.35-22.34) maverick-proposed; urgency=low
[ John Johansen ]
* SAUCE: Return correct error code for mediated network connections
- LP: #647071
[ Upstream Kernel Changes ]
* irda: Correctly clean up
The flickering bug hasn't come back so far, so it might just have been
bad coincidence. I'll watch out for it and report back if it happens
again.
Kees asked me to pocket-copy this now, doing.
--
0-day Maverick Kernel Upload
https://bugs.launchpad.net/bugs/647071
You received this bug
Copied to maverick-{updates,security} and natty.
** Changed in: linux (Ubuntu)
Status: Fix Committed = Fix Released
** Changed in: linux (Ubuntu)
Milestone: maverick-updates = None
--
0-day Maverick Kernel Upload
https://bugs.launchpad.net/bugs/647071
You received this bug
Per the following discussion on #ubuntu-devel, I've built pitti a test
kernel that reverts the 3 patches for CVE-2010-2962 in case he notices
the issue returning. The patches for CVE-2010-2962 touched the i915
driver and would have been my initial assumption for being the culprit.
The test kernel
On Mon, Oct 11, 2010 at 06:28:45AM -, Martin Pitt wrote:
Needs to be published by security team now.
No, it must be pocket-copied; security team can only unembargo from our ppa
to -security.
--
Kees Cook@outflux.net
--
0-day Maverick Kernel
** Changed in: linux (Ubuntu Maverick)
Status: Fix Committed = Fix Released
--
0-day Maverick Kernel Upload
https://bugs.launchpad.net/bugs/647071
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
Needs to be published by security team now.
** Changed in: linux (Ubuntu Maverick)
Status: Fix Released = Fix Committed
--
0-day Maverick Kernel Upload
https://bugs.launchpad.net/bugs/647071
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
Since I updated to this kernel, I now get intermittent screen hiccups,
i. e. it turns off and back on for half a second. There is nothing in
dmesg about this. How can I debug this?
--
0-day Maverick Kernel Upload
https://bugs.launchpad.net/bugs/647071
You received this bug notification because
Seems this was accidentally uploaded to maverick-proposed. Rejecting,
please reupload to -security instead.
** This bug has been flagged as a security vulnerability
--
0-day Maverick Kernel Upload
https://bugs.launchpad.net/bugs/647071
You received this bug notification because you are a member
re-uploaded with -security in the pocket.
--
0-day Maverick Kernel Upload
https://bugs.launchpad.net/bugs/647071
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
Accepted linux into maverick-proposed, the package will build now and be
available in a few hours. Please test and give feedback here. See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to
enable and use -proposed. Thank you in advance!
** Changed in: linux (Ubuntu Maverick)
Tim says that last time we also did the -proposed - -security route, so
I accepted this after all. I guess the move to -security will happen
together with the USN?
--
0-day Maverick Kernel Upload
https://bugs.launchpad.net/bugs/647071
You received this bug notification because you are a member
On Sun, Oct 10, 2010 at 09:25:49AM -, Martin Pitt wrote:
Tim says that last time we also did the -proposed - -security route, so
I accepted this after all. I guess the move to -security will happen
together with the USN?
This should be fine.
--
Kees Cook
And I've just been notified of 3 more CVE fixes which should be
included:
http://people.canonical.com/~ubuntu-security/cve/2010/CVE-2010-3437.html
Fix pktcdvd ioctl dev_minor range check
CVE-2010-3437
The PKT_CTRL_CMD_STATUS device ioctl retrieves a pointer to a
** Description changed:
The Ubuntu Kernel Team would like to propose the following fixes which
would warrant a 0-day Maverick kernel upload. All of the fixes are
security related in nature:
http://people.canonical.com/~ubuntu-security/cve/2010/CVE-2010-3080.html
ALSA: seq/oss
3 patches to resolve CVE-2010-2962 were embargoed until Oct 4. They are
meant to prevent a local root escalation hole in the i915 driver. These
patches should also be included in this day 0 kernel upload.
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2962
drm/i915: Rephrase pwrite
I'd also like to propose the fix for bug 634702 - Kernel 2.6.35-19
fails to boot Lenovo S10-3 be included in the 0-day kernel upload. The
patch has been tested and confirmed by a Canonical kernel dev to resolve
the boot issue for Lenovo S10-3's.
** Changed in: linux (Ubuntu Maverick)
Status: Triaged = Confirmed
--
0-day Maverick Kernel Upload
https://bugs.launchpad.net/bugs/647071
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
** Description changed:
The Ubuntu Kernel Team would like to propose the following fixes which
would warrant a 0-day Maverick kernel upload. All of the fixes are
security related in nature:
http://people.canonical.com/~ubuntu-security/cve/2010/CVE-2010-3080.html
- ALSA: seq/oss
update to pick this up as part of maverick-updates
** Changed in: linux (Ubuntu Maverick)
Milestone: None = maverick-updates
--
0-day Maverick Kernel Upload
https://bugs.launchpad.net/bugs/647071
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
20 matches
Mail list logo