** Changed in: linux-mvl-dove (Ubuntu Lucid) Status: In Progress => Fix Released
** Changed in: linux-mvl-dove (Ubuntu Maverick) Status: New => Fix Released ** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Oneiric) Status: In Progress => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Maverick) Status: In Progress => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Natty) Status: In Progress => Fix Committed ** Description changed: - Fixed by: + The agp_generic_remove_memory function in drivers/char/agp/generic.c in + the Linux kernel before 2.6.38.5 does not validate a certain start + parameter, which allows local users to gain privileges or cause a denial + of service (system crash) via a crafted AGPIOC_UNBIND agp_ioctl ioctl + call, a different vulnerability than CVE-2011-1745. - commit 194b3da873fd334ef183806db751473512af29ce - Author: Vasiliy Kulikov <seg...@openwall.com> - Date: Thu Apr 14 20:55:16 2011 +0400 - - agp: fix arbitrary kernel memory writes - - pg_start is copied from userspace on AGPIOC_BIND and AGPIOC_UNBIND ioctl - cmds of agp_ioctl() and passed to agpioc_bind_wrap(). As said in the - comment, (pg_start + mem->page_count) may wrap in case of AGPIOC_BIND, - and it is not checked at all in case of AGPIOC_UNBIND. As a result, user - with sufficient privileges (usually "video" group) may generate either - local DoS or privilege escalation. - - Signed-off-by: Vasiliy Kulikov <seg...@openwall.com> - Signed-off-by: Dave Airlie <airl...@redhat.com> + Fixed-by: 194b3da873fd334ef183806db751473512af29ce -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/788684 Title: CVE-2011-2022 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/788684/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs