This bug was fixed in the package linux - 2.6.31-22.67
--------------- linux (2.6.31-22.67) karmic-security; urgency=low
[ Upstream Kernel Changes ]
* Local privilege escalation vulnerability in RDS sockets - CVE-2010-3904 * v4l: disable dangerous buggy compat function - CVE-2010-2963 * mm: Do not assume ENOMEM when looking at a split stack vma - LP: #646114 * mm: Use helper to find real vma with stack guard page - LP: #646114 * Fix race in tty_fasync() properly - CVE-2009-4895 * ext4: Make sure the MOVE_EXT ioctl can't overwrite append-only files - CVE-2010-2066 * xfs: prevent swapext from operating on write-only files - CVE-2010-2226 * cifs: Fix a kernel BUG with remote OS/2 server (try #3) - CVE-2010-2248 * ethtool: Fix potential user buffer overflow for ETHTOOL_{G, S}RXFH - CVE-2010-2478 * l2tp: Fix oops in pppol2tp_xmit - CVE-2010-2495 * nfsd4: bug in read_buf - CVE-2010-2521 * CIFS: Fix a malicious redirect problem in the DNS lookup code - CVE-2010-2524 * GFS2: rename causes kernel Oops - CVE-2010-2798 * net sched: fix some kernel memory leaks - CVE-2010-2942 * jfs: don't allow os2 xattr namespace overlap with others - CVE-2010-2946 * irda: Correctly clean up self->ias_obj on irda_bind() failure. - CVE-2010-2954 * wireless extensions: fix kernel heap content leak - CVE-2010-2955 * ext4: consolidate in_range() definitions - CVE-2010-3015 * aio: check for multiplication overflow in do_io_submit - CVE-2010-3067 * xfs: prevent reading uninitialized stack memory - CVE-2010-3078 * ALSA: seq/oss - Fix double-free at error path of snd_seq_oss_open() - CVE-2010-3080 * niu: Fix kernel buffer overflow for ETHTOOL_GRXCLSRLALL - CVE-2010-3084 * rose: Fix signedness issues wrt. digi count. - CVE-2010-3310 * sctp: Do not reset the packet during sctp_packet_config(). - CVE-2010-3432 * Fix pktcdvd ioctl dev_minor range check - CVE-2010-3437 * ALSA: prevent heap corruption in snd_ctl_new() - CVE-2010-3442 * net sched: fix kernel leak in act_police - CVE-2010-3477 * Fix out-of-bounds reading in sctp_asoc_get_hmac() - CVE-2010-3705 * ocfs2: Don't walk off the end of fast symlinks. - CVE-2010-NNN2 -- Steve Conklin <email address hidden> Wed, 06 Oct 2010 16:05:21 +0100
This bug was fixed in the package linux - 2.6.31-22.67
---------------
linux (2.6.31-22.67) karmic-security; urgency=low
[ Upstream Kernel Changes ]
* Local privilege escalation vulnerability in RDS sockets config( ). get_hmac( )
- CVE-2010-3904
* v4l: disable dangerous buggy compat function
- CVE-2010-2963
* mm: Do not assume ENOMEM when looking at a split stack vma
- LP: #646114
* mm: Use helper to find real vma with stack guard page
- LP: #646114
* Fix race in tty_fasync() properly
- CVE-2009-4895
* ext4: Make sure the MOVE_EXT ioctl can't overwrite append-only files
- CVE-2010-2066
* xfs: prevent swapext from operating on write-only files
- CVE-2010-2226
* cifs: Fix a kernel BUG with remote OS/2 server (try #3)
- CVE-2010-2248
* ethtool: Fix potential user buffer overflow for ETHTOOL_{G, S}RXFH
- CVE-2010-2478
* l2tp: Fix oops in pppol2tp_xmit
- CVE-2010-2495
* nfsd4: bug in read_buf
- CVE-2010-2521
* CIFS: Fix a malicious redirect problem in the DNS lookup code
- CVE-2010-2524
* GFS2: rename causes kernel Oops
- CVE-2010-2798
* net sched: fix some kernel memory leaks
- CVE-2010-2942
* jfs: don't allow os2 xattr namespace overlap with others
- CVE-2010-2946
* irda: Correctly clean up self->ias_obj on irda_bind() failure.
- CVE-2010-2954
* wireless extensions: fix kernel heap content leak
- CVE-2010-2955
* ext4: consolidate in_range() definitions
- CVE-2010-3015
* aio: check for multiplication overflow in do_io_submit
- CVE-2010-3067
* xfs: prevent reading uninitialized stack memory
- CVE-2010-3078
* ALSA: seq/oss - Fix double-free at error path of snd_seq_oss_open()
- CVE-2010-3080
* niu: Fix kernel buffer overflow for ETHTOOL_GRXCLSRLALL
- CVE-2010-3084
* rose: Fix signedness issues wrt. digi count.
- CVE-2010-3310
* sctp: Do not reset the packet during sctp_packet_
- CVE-2010-3432
* Fix pktcdvd ioctl dev_minor range check
- CVE-2010-3437
* ALSA: prevent heap corruption in snd_ctl_new()
- CVE-2010-3442
* net sched: fix kernel leak in act_police
- CVE-2010-3477
* Fix out-of-bounds reading in sctp_asoc_
- CVE-2010-3705
* ocfs2: Don't walk off the end of fast symlinks.
- CVE-2010-NNN2
-- Steve Conklin <email address hidden> Wed, 06 Oct 2010 16:05:21 +0100