** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric)
Status: New = Invalid
** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric)
Importance: Undecided = Medium
** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
Status: New = Invalid
** Changed in:
** Also affects: linux (Ubuntu Precise)
Importance: Medium
Status: Invalid
** Also affects: linux-ec2 (Ubuntu Precise)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Precise)
Importance: Medium
Status: Invalid
** Also affects:
This bug was fixed in the package linux-fsl-imx51 - 2.6.31-610.28
---
linux-fsl-imx51 (2.6.31-610.28) lucid-proposed; urgency=low
* Release tracking bug
- LP: #837802
[ Upstream Kernel Changes ]
* ipv6: make fragment identifications less predictable, CVE-2011-2699
-
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24
---
linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low
* Release tracking bug
- LP: #838037
[ Upstream Kernel Changes ]
* ipv6: make fragment identifications less predictable, CVE-2011-2699
-
** Branch linked: lp:ubuntu/maverick-proposed/linux-ti-omap4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/814087
Title:
CVE-2011-1093
To manage notifications about this bug go to:
This bug was fixed in the package linux - 2.6.24-29.93
---
linux (2.6.24-29.93) hardy-proposed; urgency=low
[Herton R. Krzesinski]
* Release Tracking Bug
- LP: #823912
[Upstream Kernel Changes]
* close races in /proc/*/{environ,auxv}, CVE-2011-1020
- LP: #813026
** Changed in: linux-ec2 (Ubuntu Lucid)
Importance: Undecided = Medium
** Changed in: linux-ec2 (Ubuntu Oneiric)
Importance: Undecided = Medium
** Changed in: linux-ec2 (Ubuntu Hardy)
Importance: Undecided = Medium
** Changed in: linux-ec2 (Ubuntu Maverick)
Importance: Undecided =
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New = Fix Released
** Changed in: linux-ec2 (Ubuntu Oneiric)
Status: New = Invalid
** Changed in: linux-ec2 (Ubuntu Hardy)
Status: New = Invalid
** Changed in: linux-ec2 (Ubuntu Maverick)
Status: New = Invalid
**
** Description changed:
The dccp_rcv_state_process function in net/dccp/input.c in the Datagram
Congestion Control Protocol (DCCP) implementation in the Linux kernel
before 2.6.38 does not properly handle packets for a CLOSED endpoint,
which allows remote attackers to cause a denial of
** Description changed:
- Placeholder
+ The dccp_rcv_state_process function in net/dccp/input.c in the Datagram
+ Congestion Control Protocol (DCCP) implementation in the Linux kernel
+ before 2.6.38 does not properly handle packets for a CLOSED endpoint, which
+ allows remote attackers to cause
** Description changed:
The dccp_rcv_state_process function in net/dccp/input.c in the Datagram
Congestion Control Protocol (DCCP) implementation in the Linux kernel
- before 2.6.38 does not properly handle packets for a CLOSED endpoint, which
- allows remote attackers to cause a denial of
CVE-2011-1093
** Also affects: linux (Ubuntu Oneiric)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Oneiric)
Importance: Undecided
Status: New
** Also affects: linux-lts-backport-maverick (Ubuntu Oneiric)
Importance: Undecided
Status:
** Changed in: linux (Ubuntu Hardy)
Status: In Progress = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/814087
Title:
CVE-2011-1093
To manage notifications about this bug go
** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
Status: In Progress = Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Maverick)
Status: In Progress = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
14 matches
Mail list logo