** Changed in: linux (Ubuntu Dapper)
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/712354
Title:
CVE-2010-4161
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.u
** Changed in: linux (Ubuntu Dapper)
Assignee: (unassigned) => Andy Whitcroft (apw)
** Changed in: linux (Ubuntu Dapper)
Status: New => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net
This commit was introduced in v2.6.19, with a key fix for it hitting
v2.6.20. Therefore this is already fixed for all releases Hardy and
later.
** Changed in: linux (Ubuntu Hardy)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Karmic)
Importance: Undecided => Medium
** Chang
Actually the CVE report is somewhat confused and actually the below
seems to be the correct upstream fix:
commit fda9ef5d679b07c9d9097aaf6ef7f069d794a8f9
Author: Dmitry Mishin
Date: Thu Aug 31 15:28:39 2006 -0700
[NET]: Fix sk->sk_filter field access
Function sk_filter() is
This is fixed by the commit below in mainline:
commit 57fe93b374a6b8711995c2d466c502af9f3a08bb
Author: David S. Miller
Date: Wed Nov 10 10:38:24 2010 -0800
filter: make sure filters dont read uninitialized memory
There is a possibility malicious users can get limited informa