[Bug 646114] Re: mlock on stack will create guard page gap
Launchpad Bug Tracker
646114 at bugs.launchpad.net
Tue Oct 19 18:11:30 UTC 2010
This bug was fixed in the package linux - 2.6.32-25.45
---------------
linux (2.6.32-25.45) lucid-security; urgency=low
[ Upstream Kernel Changes ]
* v4l: disable dangerous buggy compat function
- CVE-2010-2963
* Local privilege escalation vulnerability in RDS sockets
- CVE-2010-3904
* mm: (pre-stable) Move vma_stack_continue into mm.h
- LP: #646114
* net sched: fix some kernel memory leaks
- CVE-2010-2942
* irda: Correctly clean up self->ias_obj on irda_bind() failure.
- CVE-2010-2954
* wireless extensions: fix kernel heap content leak
- CVE-2010-2955
* KEYS: Fix RCU no-lock warning in keyctl_session_to_parent()
- CVE-2010-2960
* KEYS: Fix bug in keyctl_session_to_parent() if parent has no session
keyring
- CVE-2010-2960
* aio: check for multiplication overflow in do_io_submit
- CVE-2010-3067
* xfs: prevent reading uninitialized stack memory
- CVE-2010-3078
* ALSA: seq/oss - Fix double-free at error path of snd_seq_oss_open()
- CVE-2010-3080
* niu: Fix kernel buffer overflow for ETHTOOL_GRXCLSRLALL
- CVE-2010-3084
* rose: Fix signedness issues wrt. digi count.
- CVE-2010-3310
* sctp: Do not reset the packet during sctp_packet_config().
- CVE-2010-3432
* Fix pktcdvd ioctl dev_minor range check
- CVE-2010-3437
* ALSA: prevent heap corruption in snd_ctl_new()
- CVE-2010-3442
* net sched: fix kernel leak in act_police
- CVE-2010-3477
* Fix out-of-bounds reading in sctp_asoc_get_hmac()
- CVE-2010-3705
* ocfs2: Don't walk off the end of fast symlinks.
- CVE-2010-NNN2
-- Steve Conklin <sconklin at canonical.com> Wed, 06 Oct 2010 16:16:20 +0100
** Changed in: linux (Ubuntu Lucid)
Status: New => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2942
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2954
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2955
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2960
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2963
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3067
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3078
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3080
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3084
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3310
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3432
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3437
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3442
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3477
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3705
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3904
** Changed in: linux (Ubuntu Karmic)
Status: New => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-4895
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2066
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2226
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2248
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2478
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2495
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2521
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2524
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2798
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2946
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3015
--
mlock on stack will create guard page gap
https://bugs.launchpad.net/bugs/646114
You received this bug notification because you are a member of Kernel
Bugs, which is subscribed to linux in ubuntu.
More information about the kernel-bugs
mailing list