This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24
---
linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low
* Release tracking bug
- LP: #838037
[ Upstream Kernel Changes ]
* ipv6: make fragment identifications less predictable, CVE-2011-2699
- L
This bug was fixed in the package linux-fsl-imx51 - 2.6.31-610.28
---
linux-fsl-imx51 (2.6.31-610.28) lucid-proposed; urgency=low
* Release tracking bug
- LP: #837802
[ Upstream Kernel Changes ]
* ipv6: make fragment identifications less predictable, CVE-2011-2699
- LP
** Branch linked: lp:ubuntu/maverick-proposed/linux-ti-omap4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721455
Title:
CVE-2010-4175
To manage notifications about this bug go to:
https://bugs.lau
** Tags added: kernel-cve-tracking-bug
** Tags removed: kernel-cve-tracker
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721455
Title:
CVE-2010-4175
To manage notifications about this bug go to:
ht
** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721455
Title:
CVE-2010-4175
To manage notifications about thi
** Also affects: linux-fsl-imx51 (Ubuntu)
Importance: Undecided
Status: New
** Changed in: linux-fsl-imx51 (Ubuntu)
Status: New => Invalid
** Changed in: linux-fsl-imx51 (Ubuntu Dapper)
Status: New => Invalid
** Changed in: linux-fsl-imx51 (Ubuntu Hardy)
Status: Ne
** Changed in: linux-ti-omap4 (Ubuntu)
Status: New => Invalid
** Changed in: linux-ti-omap4 (Ubuntu Dapper)
Status: New => Invalid
** Changed in: linux-ti-omap4 (Ubuntu Hardy)
Status: New => Invalid
** Changed in: linux-ti-omap4 (Ubuntu Karmic)
Status: New => Invalid
** Also affects: linux-ti-omap4 (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721455
Title:
CVE-2010-4175
To manage notifications about this bug
This bug was fixed in the package linux - 2.6.35-28.49
---
linux (2.6.35-28.49) maverick-proposed; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #726796
[ Colin Ian King ]
* SAUCE: Dell All-In-One: Remove need for Dell module alias
[ Manoj Iyer ]
* SAUCE:
This bug was fixed in the package linux - 2.6.32-30.59
---
linux (2.6.32-30.59) lucid-proposed; urgency=low
[ Steve Conklin ]
* Release Tracking Bug
- LP: #727336
[ Tim Gardner ]
* [Config] CONFIG_IRQ_TIME_ACCOUNTING=n
- LP: #723819
[ Upstream Kernel Changes ]
This bug was fixed in the package linux - 2.6.31-23.74
---
linux (2.6.31-23.74) karmic-proposed; urgency=low
[ Steve Conklin ]
* Release Tracking Bug
- LP: #725232
[ Upstream Kernel Changes ]
* bluetooth: Fix missing NULL check, CVE-2010-4242
- LP: #714846
- CVE
** Branch linked: lp:ubuntu/lucid-proposed/linux-ec2
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721455
Title:
CVE-2010-4175
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://list
** Tags added: kernel-cve-tracker
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721455
Title:
CVE-2010-4175
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailma
** Branch linked: lp:ubuntu/karmic-proposed/linux-ec2
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721455
Title:
CVE-2010-4175
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lis
** Changed in: linux (Ubuntu Karmic)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Lucid)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Maverick)
Status: In Progress => Fix Committed
--
You received this bug notification because you a
** Changed in: linux (Ubuntu Lucid)
Status: New => In Progress
** Changed in: linux (Ubuntu Lucid)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Lucid)
Assignee: (unassigned) => Brad Figg (brad-figg)
** Changed in: linux (Ubuntu Karmic)
Status: New => In Prog
** Changed in: linux (Ubuntu Maverick)
Status: New => In Progress
** Changed in: linux (Ubuntu Maverick)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Maverick)
Assignee: (unassigned) => Brad Figg (brad-figg)
--
You received this bug notification because you are a
** Changed in: linux (Ubuntu Natty)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721455
Title:
CVE-2010-4175
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubunt
** Description changed:
- Placeholder
+ In rds_cmsg_rdma_args(), the user-provided args->nr_local value is
+ restricted to less than UINT_MAX. This seems to need a tighter upper
+ bound, since the calculation of total iov_size can overflow, resulting
+ in a small sock_kmalloc() allocation. This
19 matches
Mail list logo