[ubuntu/karmic-security] linux (delayed), linux 2.6.31-22.67 (Accepted)

Ubuntu Installer archive at ubuntu.com
Tue Oct 19 19:07:37 BST 2010


linux (2.6.31-22.67) karmic-security; urgency=low

  [ Upstream Kernel Changes ]

  * Local privilege escalation vulnerability in RDS sockets
    - CVE-2010-3904
  * v4l: disable dangerous buggy compat function
    - CVE-2010-2963
  * mm: Do not assume ENOMEM when looking at a split stack vma
    -  LP: #646114
  * mm: Use helper to find real vma with stack guard page
    -  LP: #646114
  * Fix race in tty_fasync() properly
    - CVE-2009-4895
  * ext4: Make sure the MOVE_EXT ioctl can't overwrite append-only files
    - CVE-2010-2066
  * xfs: prevent swapext from operating on write-only files
    - CVE-2010-2226
  * cifs: Fix a kernel BUG with remote OS/2 server (try #3)
    - CVE-2010-2248
  * ethtool: Fix potential user buffer overflow for ETHTOOL_{G, S}RXFH
    - CVE-2010-2478
  * l2tp: Fix oops in pppol2tp_xmit
    - CVE-2010-2495
  * nfsd4: bug in read_buf
    - CVE-2010-2521
  * CIFS: Fix a malicious redirect problem in the DNS lookup code
    - CVE-2010-2524
  * GFS2: rename causes kernel Oops
    - CVE-2010-2798
  * net sched: fix some kernel memory leaks
    - CVE-2010-2942
  * jfs: don't allow os2 xattr namespace overlap with others
    - CVE-2010-2946
  * irda: Correctly clean up self->ias_obj on irda_bind() failure.
    - CVE-2010-2954
  * wireless extensions: fix kernel heap content leak
    - CVE-2010-2955
  * ext4: consolidate in_range() definitions
    - CVE-2010-3015
  * aio: check for multiplication overflow in do_io_submit
    - CVE-2010-3067
  * xfs: prevent reading uninitialized stack memory
    - CVE-2010-3078
  * ALSA: seq/oss - Fix double-free at error path of snd_seq_oss_open()
    - CVE-2010-3080
  * niu: Fix kernel buffer overflow for ETHTOOL_GRXCLSRLALL
    - CVE-2010-3084
  * rose: Fix signedness issues wrt. digi count.
    - CVE-2010-3310
  * sctp: Do not reset the packet during sctp_packet_config().
    - CVE-2010-3432
  * Fix pktcdvd ioctl dev_minor range check
    - CVE-2010-3437
  * ALSA: prevent heap corruption in snd_ctl_new()
    - CVE-2010-3442
  * net sched: fix kernel leak in act_police
    - CVE-2010-3477
  * Fix out-of-bounds reading in sctp_asoc_get_hmac()
    - CVE-2010-3705
  * ocfs2: Don't walk off the end of fast symlinks.
    - CVE-2010-NNN2

Date: Wed, 06 Oct 2010 16:05:21 +0100
Changed-By: Steve Conklin <sconklin at canonical.com>
Maintainer: Ubuntu Kernel Team <kernel-team at lists.ubuntu.com>
https://launchpad.net/ubuntu/karmic/+source/linux/2.6.31-22.67
-------------- next part --------------
Format: 1.8
Date: Wed, 06 Oct 2010 16:05:21 +0100
Source: linux
Binary: linux-source-2.6.31 linux-doc linux-headers-2.6.31-22 linux-libc-dev linux-image-2.6.31-22-386 linux-headers-2.6.31-22-386 linux-image-debug-2.6.31-22-386 linux-image-2.6.31-22-generic linux-headers-2.6.31-22-generic linux-image-debug-2.6.31-22-generic linux-image-2.6.31-22-generic-pae linux-headers-2.6.31-22-generic-pae linux-image-debug-2.6.31-22-generic-pae linux-image-2.6.31-22-ia64 linux-headers-2.6.31-22-ia64 linux-image-debug-2.6.31-22-ia64 linux-image-2.6.31-22-lpia linux-headers-2.6.31-22-lpia linux-image-debug-2.6.31-22-lpia linux-image-2.6.31-22-powerpc linux-headers-2.6.31-22-powerpc linux-image-debug-2.6.31-22-powerpc linux-image-2.6.31-22-powerpc-smp linux-headers-2.6.31-22-powerpc-smp linux-image-debug-2.6.31-22-powerpc-smp linux-image-2.6.31-22-powerpc64-smp linux-headers-2.6.31-22-powerpc64-smp linux-image-debug-2.6.31-22-powerpc64-smp linux-image-2.6.31-22-server linux-headers-2.6.31-22-server linux-image-debug-2.6.31-22-server linux-image-2.6.31-22-sparc64
 linux-headers-2.6.31-22-sparc64 linux-image-debug-2.6.31-22-sparc64 linux-image-2.6.31-22-sparc64-smp linux-headers-2.6.31-22-sparc64-smp linux-image-debug-2.6.31-22-sparc64-smp linux-image-2.6.31-22-virtual kernel-image-2.6.31-22-generic-di nic-modules-2.6.31-22-generic-di nic-shared-modules-2.6.31-22-generic-di serial-modules-2.6.31-22-generic-di ppp-modules-2.6.31-22-generic-di firewire-core-modules-2.6.31-22-generic-di scsi-modules-2.6.31-22-generic-di plip-modules-2.6.31-22-generic-di floppy-modules-2.6.31-22-generic-di fat-modules-2.6.31-22-generic-di nfs-modules-2.6.31-22-generic-di md-modules-2.6.31-22-generic-di usb-modules-2.6.31-22-generic-di pcmcia-storage-modules-2.6.31-22-generic-di fb-modules-2.6.31-22-generic-di input-modules-2.6.31-22-generic-di mouse-modules-2.6.31-22-generic-di irda-modules-2.6.31-22-generic-di parport-modules-2.6.31-22-generic-di nic-pcmcia-modules-2.6.31-22-generic-di pcmcia-modules-2.6.31-22-generic-di nic-usb-modules-2.6.31-22-generic-di
 sata-modules-2.6.31-22-generic-di crypto-modules-2.6.31-22-generic-di char-modules-2.6.31-22-generic-di fs-core-modules-2.6.31-22-generic-di fs-secondary-modules-2.6.31-22-generic-di pata-modules-2.6.31-22-generic-di storage-core-modules-2.6.31-22-generic-di block-modules-2.6.31-22-generic-di message-modules-2.6.31-22-generic-di virtio-modules-2.6.31-22-generic-di
Architecture: source
Version: 2.6.31-22.67
Distribution: karmic-security
Urgency: low
Maintainer: Ubuntu Kernel Team <kernel-team at lists.ubuntu.com>
Changed-By: Steve Conklin <sconklin at canonical.com>
Description: 
 block-modules-2.6.31-22-generic-di - Block storage devices (udeb)
 char-modules-2.6.31-22-generic-di - Character module support (udeb)
 crypto-modules-2.6.31-22-generic-di - crypto modules (udeb)
 fat-modules-2.6.31-22-generic-di - FAT filesystem support (udeb)
 fb-modules-2.6.31-22-generic-di - Framebuffer modules (udeb)
 firewire-core-modules-2.6.31-22-generic-di - Firewire (IEEE-1394) Support (udeb)
 floppy-modules-2.6.31-22-generic-di - Floppy driver support (udeb)
 fs-core-modules-2.6.31-22-generic-di - Base filesystem modules (udeb)
 fs-secondary-modules-2.6.31-22-generic-di - Extra filesystem modules (udeb)
 input-modules-2.6.31-22-generic-di - Support for various input methods (udeb)
 irda-modules-2.6.31-22-generic-di - Support for Infrared protocols (udeb)
 kernel-image-2.6.31-22-generic-di - Linux kernel binary image for the Debian installer (udeb)
 linux-doc  - Linux kernel specific documentation for version 2.6.31
 linux-headers-2.6.31-22 - Header files related to Linux kernel version 2.6.31
 linux-headers-2.6.31-22-386 - Linux kernel headers for version 2.6.31 on i386
 linux-headers-2.6.31-22-generic - Linux kernel headers for version 2.6.31 on x86/x86_64
 linux-headers-2.6.31-22-generic-pae - Linux kernel headers for version 2.6.31 on x86
 linux-headers-2.6.31-22-ia64 - Linux kernel headers for version 2.6.31 on IA-64 SMP
 linux-headers-2.6.31-22-lpia - Linux kernel headers for version 2.6.31 on Intel Atom processors
 linux-headers-2.6.31-22-powerpc - Linux kernel headers for version 2.6.31 on 32-bit PowerPC
 linux-headers-2.6.31-22-powerpc-smp - Linux kernel headers for version 2.6.31 on 32-bit PowerPC SMP
 linux-headers-2.6.31-22-powerpc64-smp - Linux kernel headers for version 2.6.31 on 64-bit PowerPC SMP
 linux-headers-2.6.31-22-server - Linux kernel headers for version 2.6.31 on x86_64
 linux-headers-2.6.31-22-sparc64 - Linux kernel headers for version 2.6.31 on 64-bit UltraSPARC
 linux-headers-2.6.31-22-sparc64-smp - Linux kernel headers for version 2.6.31 on 64-bit UltraSPARC SMP
 linux-image-2.6.31-22-386 - Linux kernel image for version 2.6.31 on i386
 linux-image-2.6.31-22-generic - Linux kernel image for version 2.6.31 on x86/x86_64
 linux-image-2.6.31-22-generic-pae - Linux kernel image for version 2.6.31 on x86
 linux-image-2.6.31-22-ia64 - Linux kernel image for version 2.6.31 on IA-64 SMP
 linux-image-2.6.31-22-lpia - Linux kernel image for version 2.6.31 on Intel Atom processors
 linux-image-2.6.31-22-powerpc - Linux kernel image for version 2.6.31 on 32-bit PowerPC
 linux-image-2.6.31-22-powerpc-smp - Linux kernel image for version 2.6.31 on 32-bit PowerPC SMP
 linux-image-2.6.31-22-powerpc64-smp - Linux kernel image for version 2.6.31 on 64-bit PowerPC SMP
 linux-image-2.6.31-22-server - Linux kernel image for version 2.6.31 on x86_64
 linux-image-2.6.31-22-sparc64 - Linux kernel image for version 2.6.31 on 64-bit UltraSPARC
 linux-image-2.6.31-22-sparc64-smp - Linux kernel image for version 2.6.31 on 64-bit UltraSPARC SMP
 linux-image-2.6.31-22-virtual - Linux kernel image for version 2.6.31 on x86/x86_64
 linux-image-debug-2.6.31-22-386 - Linux kernel debug image for version 2.6.31 on i386
 linux-image-debug-2.6.31-22-generic - Linux kernel debug image for version 2.6.31 on x86/x86_64
 linux-image-debug-2.6.31-22-generic-pae - Linux kernel debug image for version 2.6.31 on x86
 linux-image-debug-2.6.31-22-ia64 - Linux kernel debug image for version 2.6.31 on IA-64 SMP
 linux-image-debug-2.6.31-22-lpia - Linux kernel debug image for version 2.6.31 on Intel Atom process
 linux-image-debug-2.6.31-22-powerpc - Linux kernel debug image for version 2.6.31 on 32-bit PowerPC
 linux-image-debug-2.6.31-22-powerpc-smp - Linux kernel debug image for version 2.6.31 on 32-bit PowerPC SMP
 linux-image-debug-2.6.31-22-powerpc64-smp - Linux kernel debug image for version 2.6.31 on 64-bit PowerPC SMP
 linux-image-debug-2.6.31-22-server - Linux kernel debug image for version 2.6.31 on x86_64
 linux-image-debug-2.6.31-22-sparc64 - Linux kernel debug image for version 2.6.31 on 64-bit UltraSPARC
 linux-image-debug-2.6.31-22-sparc64-smp - Linux kernel debug image for version 2.6.31 on 64-bit UltraSPARC 
 linux-libc-dev - Linux Kernel Headers for development
 linux-source-2.6.31 - Linux kernel source for version 2.6.31 with Ubuntu patches
 md-modules-2.6.31-22-generic-di - Multi-device support (raid, device-mapper, lvm) (udeb)
 message-modules-2.6.31-22-generic-di - Fusion and i2o storage modules (udeb)
 mouse-modules-2.6.31-22-generic-di - Mouse support (udeb)
 nfs-modules-2.6.31-22-generic-di - NFS filesystem drivers (udeb)
 nic-modules-2.6.31-22-generic-di - Network interface support (udeb)
 nic-pcmcia-modules-2.6.31-22-generic-di - PCMCIA network interface support (udeb)
 nic-shared-modules-2.6.31-22-generic-di - nic shared modules (udeb)
 nic-usb-modules-2.6.31-22-generic-di - USB network interface support (udeb)
 parport-modules-2.6.31-22-generic-di - Parallel port support (udeb)
 pata-modules-2.6.31-22-generic-di - PATA support modules (udeb)
 pcmcia-modules-2.6.31-22-generic-di - PCMCIA Modules (udeb)
 pcmcia-storage-modules-2.6.31-22-generic-di - PCMCIA storage support (udeb)
 plip-modules-2.6.31-22-generic-di - PLIP (parallel port) networking support (udeb)
 ppp-modules-2.6.31-22-generic-di - PPP (serial port) networking support (udeb)
 sata-modules-2.6.31-22-generic-di - SATA storage support (udeb)
 scsi-modules-2.6.31-22-generic-di - SCSI storage support (udeb)
 serial-modules-2.6.31-22-generic-di - Serial port support (udeb)
 storage-core-modules-2.6.31-22-generic-di - Core storage support (udeb)
 usb-modules-2.6.31-22-generic-di - Core USB support (udeb)
 virtio-modules-2.6.31-22-generic-di - VirtIO Modules (udeb)
Changes: 
 linux (2.6.31-22.67) karmic-security; urgency=low
 .
   [ Upstream Kernel Changes ]
 .
   * Local privilege escalation vulnerability in RDS sockets
     - CVE-2010-3904
   * v4l: disable dangerous buggy compat function
     - CVE-2010-2963
   * mm: Do not assume ENOMEM when looking at a split stack vma
     -  LP: #646114
   * mm: Use helper to find real vma with stack guard page
     -  LP: #646114
   * Fix race in tty_fasync() properly
     - CVE-2009-4895
   * ext4: Make sure the MOVE_EXT ioctl can't overwrite append-only files
     - CVE-2010-2066
   * xfs: prevent swapext from operating on write-only files
     - CVE-2010-2226
   * cifs: Fix a kernel BUG with remote OS/2 server (try #3)
     - CVE-2010-2248
   * ethtool: Fix potential user buffer overflow for ETHTOOL_{G, S}RXFH
     - CVE-2010-2478
   * l2tp: Fix oops in pppol2tp_xmit
     - CVE-2010-2495
   * nfsd4: bug in read_buf
     - CVE-2010-2521
   * CIFS: Fix a malicious redirect problem in the DNS lookup code
     - CVE-2010-2524
   * GFS2: rename causes kernel Oops
     - CVE-2010-2798
   * net sched: fix some kernel memory leaks
     - CVE-2010-2942
   * jfs: don't allow os2 xattr namespace overlap with others
     - CVE-2010-2946
   * irda: Correctly clean up self->ias_obj on irda_bind() failure.
     - CVE-2010-2954
   * wireless extensions: fix kernel heap content leak
     - CVE-2010-2955
   * ext4: consolidate in_range() definitions
     - CVE-2010-3015
   * aio: check for multiplication overflow in do_io_submit
     - CVE-2010-3067
   * xfs: prevent reading uninitialized stack memory
     - CVE-2010-3078
   * ALSA: seq/oss - Fix double-free at error path of snd_seq_oss_open()
     - CVE-2010-3080
   * niu: Fix kernel buffer overflow for ETHTOOL_GRXCLSRLALL
     - CVE-2010-3084
   * rose: Fix signedness issues wrt. digi count.
     - CVE-2010-3310
   * sctp: Do not reset the packet during sctp_packet_config().
     - CVE-2010-3432
   * Fix pktcdvd ioctl dev_minor range check
     - CVE-2010-3437
   * ALSA: prevent heap corruption in snd_ctl_new()
     - CVE-2010-3442
   * net sched: fix kernel leak in act_police
     - CVE-2010-3477
   * Fix out-of-bounds reading in sctp_asoc_get_hmac()
     - CVE-2010-3705
   * ocfs2: Don't walk off the end of fast symlinks.
     - CVE-2010-NNN2
Checksums-Sha1: 
 59fb15bb87f600a32f27d5acdce475b90f59c1db 4422 linux_2.6.31-22.67.dsc
 809f549d4145dcbac1ea551cdb5f26f7c4f34c31 2994154 linux_2.6.31-22.67.diff.gz
Checksums-Sha256: 
 16b8b7150715bb6a1c645914b5c797cf9e0fba5082438170586a623db7e951e3 4422 linux_2.6.31-22.67.dsc
 ddfd8365ebf16bd5785b06956de0f32796b3251fbc75a0f40a72e2285e9d0407 2994154 linux_2.6.31-22.67.diff.gz
Files: 
 31f292eea4a6de474e6af0fea887aeef 4422 devel optional linux_2.6.31-22.67.dsc
 d4c0b765b973f6461a4c2ec22297cd6e 2994154 devel optional linux_2.6.31-22.67.diff.gz
Launchpad-Bugs-Fixed: 646114 646114


More information about the Karmic-changes mailing list