Please note:
- linux-image-xen are in universe
- this is a security update, hence it didn't go through -proposed
- the patches come from upstream

This change from debian/changelog is suspicious as it touches memory.c which is 
in the assertion reported in this bug:
  * OPENVZ: Fixup patches to memory.c and mlock.c
    - CVE-2010-2240

** Changed in: linux (Ubuntu)
   Importance: Undecided => Critical

** Also affects: linux (Ubuntu Hardy)
   Importance: Undecided
       Status: New

** Changed in: linux (Ubuntu Hardy)
       Status: New => Confirmed

** Changed in: linux (Ubuntu Hardy)
   Importance: Undecided => Critical

** Changed in: linux (Ubuntu)
       Status: Confirmed => Invalid

** Changed in: linux (Ubuntu)
   Importance: Critical => Undecided

** Summary changed:

- xen kernel bug: 'kernel BUG at 
/build/buildd/linux-2.6.24/debian/build/custom-source-xen/mm/memory.c:2704'
+ linux 2.6.24-28.75 breaks xen flavours (xen kernel bug: 'kernel BUG at 
/build/buildd/linux-2.6.24/debian/build/custom-source-xen/mm/memory.c:2704')

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2240

-- 
linux 2.6.24-28.75 breaks xen flavours (xen kernel bug: 'kernel BUG at 
/build/buildd/linux-2.6.24/debian/build/custom-source-xen/mm/memory.c:2704')
https://bugs.launchpad.net/bugs/620994
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to