[Bug 784727] Re: CVE-2011-1593

2015-06-17 Thread Rolf Leggewie
lucid has seen the end of its life and is no longer receiving any updates. Marking the lucid task for this ticket as Won't Fix. ** Changed in: linux-mvl-dove (Ubuntu Lucid) Status: New = Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 784727] Re: CVE-2011-1593

2013-05-22 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/784727 Title: CVE-2011-1593 To manage notifications about

[Bug 784727] Re: CVE-2011-1593

2013-05-21 Thread Jamie Strandboge
** Changed in: linux-ti-omap4 (Ubuntu Maverick) Status: In Progress = Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/784727 Title: CVE-2011-1593 To manage notifications about this

[Bug 784727] Re: CVE-2011-1593

2011-07-05 Thread Andy Whitcroft
** Changed in: linux-lts-backport-maverick (Ubuntu Maverick) Status: New = Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Natty) Status: New = Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Oneiric) Status: New = Invalid ** Changed in:

[Bug 784727] Re: CVE-2011-1593

2011-07-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-fsl-imx51 - 2.6.31-609.26 --- linux-fsl-imx51 (2.6.31-609.26) lucid; urgency=low [ Paolo Pisati ] * Tracking bug - LP: #795219 * [Config] Disable parport_pc on fsl-imx51 - LP: #601226 [ Upstream Kernel Changes ] * ALSA:

[Bug 784727] Re: CVE-2011-1593

2011-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.24-29.90 --- linux (2.6.24-29.90) hardy-proposed; urgency=low [ Herton R. Krzesinski ] * Release Tracking Bug - LP: #788843 [Upstream Kernel Changes] * IB/cm: Bump reference count on cm_id before invoking callback,

[Bug 784727] Re: CVE-2011-1593

2011-05-30 Thread Paolo Pisati
** Changed in: linux-fsl-imx51 (Ubuntu Hardy) Status: New = Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Maverick) Status: New = Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Natty) Status: New = Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Oneiric) Status: New

[Bug 784727] Re: CVE-2011-1593

2011-05-30 Thread Paolo Pisati
fix already present ** Changed in: linux-fsl-imx51 (Ubuntu Lucid) Status: New = In Progress ** Changed in: linux-fsl-imx51 (Ubuntu Lucid) Assignee: (unassigned) = Paolo Pisati (p-pisati) ** Changed in: linux-ti-omap4 (Ubuntu Maverick) Status: New = In Progress ** Changed in:

[Bug 784727] Re: CVE-2011-1593

2011-05-30 Thread Paolo Pisati
fix already present ** Changed in: linux-ti-omap4 (Ubuntu Natty) Status: New = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/784727 Title: CVE-2011-1593 -- ubuntu-bugs

[Bug 784727] Re: CVE-2011-1593

2011-05-18 Thread Brad Figg
** Also affects: linux (Ubuntu Dapper) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Dapper) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Dapper) Importance: Undecided Status: New ** Also

[Bug 784727] Re: CVE-2011-1593

2011-05-18 Thread Herton R. Krzesinski
** Description changed: - Placeholder + next_pidmap: fix overflow condition + + next_pidmap() just quietly accepted whatever 'last' pid that was passed + in, which is not all that safe when one of the users is /proc. + + Admittedly the proc code should do some sanity checking on the range +

[Bug 784727] Re: CVE-2011-1593

2011-05-18 Thread Herton R. Krzesinski
Fix released on 2.6.39-rc4 ** Changed in: linux (Ubuntu Hardy) Importance: Undecided = Medium ** Changed in: linux (Ubuntu Hardy) Status: New = In Progress ** Changed in: linux (Ubuntu Hardy) Assignee: (unassigned) = Herton R. Krzesinski (herton) ** Changed in: linux (Ubuntu

[Bug 784727] Re: CVE-2011-1593

2011-05-18 Thread Herton R. Krzesinski
Fix released with stable update (2.6.32.39) ** Changed in: linux (Ubuntu Lucid) Importance: Undecided = Medium ** Changed in: linux (Ubuntu Lucid) Status: New = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 784727] Re: CVE-2011-1593

2011-05-18 Thread Herton R. Krzesinski
Fix released with stable update (2.6.35.13) ** Changed in: linux (Ubuntu Maverick) Importance: Undecided = Medium ** Changed in: linux (Ubuntu Maverick) Status: New = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to

[Bug 784727] Re: CVE-2011-1593

2011-05-18 Thread Herton R. Krzesinski
Fix released with stable update (2.6.38.4) ** Changed in: linux (Ubuntu Natty) Importance: Undecided = Medium ** Changed in: linux (Ubuntu Natty) Status: New = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 784727] Re: CVE-2011-1593

2011-05-18 Thread Herton R. Krzesinski
** Patch added: next_pidmap: fix overflow condition https://bugs.launchpad.net/ubuntu/natty/+source/linux/+bug/784727/+attachment/2134163/+files/0001-next_pidmap-fix-overflow-condition-CVE-2011-1593.patch -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 784727] Re: CVE-2011-1593

2011-05-18 Thread Herton R. Krzesinski
** Patch added: proc: do proper range check on readdir offset https://bugs.launchpad.net/ubuntu/natty/+source/linux/+bug/784727/+attachment/2134164/+files/0002-proc-do-proper-range-check-on-readdir-offset-CVE-201.patch -- You received this bug notification because you are a member of Ubuntu