linux-mvl-dove (2.6.31-214.28) karmic-security; urgency=low
[ Stefan Bader ]
* Rebase to 2.6.31-22.60
[ Ubuntu: 2.6.31-22.60 ]
* kvm: restrict writing of segment selectors to segment registers
- CVE-2010-0419
* USB: usbfs: properly clean up the as structure on error paths
- CVE-2010-1083
* Bluetooth: Fix potential bad memory access with sysfs files
- CVE-2010-1084
* ALSA: hda-intel: Avoid divide by zero crash
- CVE-2010-1085
* dvb-core: Fix DoS bug in ULE decapsulation code that can be triggered
by an invalid Payload Pointer
- CVE-2010-1086
* GFS2: Skip check for mandatory locks when unlocking
- CVE-2010-0727
* tipc: Fix oops on send prior to entering networked mode (v3)
- CVE-2010-1187
* inotify: do not reuse watch descriptors
- LP: #485556
* idr: fix a critical misallocation bug, take#2
- LP: #485556
* tty: release_one_tty() forgets to put pids
- CVE-2010-1162
* reiserfs: fix permissions on .reiserfs_priv
- CVE-2010-1146
* fix LOOKUP_FOLLOW on automount "symlinks"
- CVE-2010-1088
* NFS: Fix an Oops when truncating a file
- CVE-2010-1087
* Attempt #2 to handle null nameidata
- CVE-2010-1148
* r8169: Fix receive buffer length when MTU is between 1515 and 1536
- CVE-2009-4537
* r8169: offical fix for CVE-2009-4537 (overlength frame DMAs)
- CVE-2009-4537
* KVM: Use kvm_{read,write}_guest_virt() to read and write segment
descriptors
- CVE-2010-0298
- CVE-2010-0306
* KVM: x86 emulator: Check CPL level during privilege instruction
emulation
- CVE-2010-0298
- CVE-2010-0306
* KVM: x86 emulator: Add Virtual-8086 mode of emulation
- CVE-2010-0298
- CVE-2010-0306
* KVM: x86 emulator: fix memory access during x86 emulation
- CVE-2010-0298
- CVE-2010-0306
* KVM: x86 emulator: Check IOPL level during io instruction emulation
- CVE-2010-0298
- CVE-2010-0306
* KVM: x86 emulator: Fix popf emulation
- CVE-2010-0298
- CVE-2010-0306
* KVM: VMX: Use macros instead of hex value on cr0 initialization
- CVE-2010-0298
- CVE-2010-0306
* KVM: SVM: Reset cr0 properly on vcpu reset
- CVE-2010-0298
- CVE-2010-0306
* KVM: x86: disable paravirt mmu reporting
- CVE-2010-0298
- CVE-2010-0306
Date: Tue, 25 May 2010 14:20:21 +0000
Changed-By: Stefan Bader <[email protected]>
Maintainer: Ubuntu Kernel Team <[email protected]>
https://launchpad.net/ubuntu/karmic/+source/linux-mvl-dove/2.6.31-214.28
Format: 1.8
Date: Tue, 25 May 2010 14:20:21 +0000
Source: linux-mvl-dove
Binary: linux-headers-2.6.31-214 linux-image-2.6.31-214-dove
linux-headers-2.6.31-214-dove linux-image-debug-2.6.31-214-dove
linux-image-2.6.31-214-dove-z0 linux-headers-2.6.31-214-dove-z0
linux-image-debug-2.6.31-214-dove-z0 kernel-image-2.6.31-214-dove-di
nic-modules-2.6.31-214-dove-di nic-shared-modules-2.6.31-214-dove-di
ppp-modules-2.6.31-214-dove-di firewire-core-modules-2.6.31-214-dove-di
scsi-modules-2.6.31-214-dove-di plip-modules-2.6.31-214-dove-di
fat-modules-2.6.31-214-dove-di nfs-modules-2.6.31-214-dove-di
md-modules-2.6.31-214-dove-di usb-modules-2.6.31-214-dove-di
input-modules-2.6.31-214-dove-di mouse-modules-2.6.31-214-dove-di
parport-modules-2.6.31-214-dove-di nic-usb-modules-2.6.31-214-dove-di
crypto-modules-2.6.31-214-dove-di fs-core-modules-2.6.31-214-dove-di
fs-secondary-modules-2.6.31-214-dove-di block-modules-2.6.31-214-dove-di
Architecture: source
Version: 2.6.31-214.28
Distribution: karmic-security
Urgency: low
Maintainer: Ubuntu Kernel Team <[email protected]>
Changed-By: Stefan Bader <[email protected]>
Description:
block-modules-2.6.31-214-dove-di - Block storage devices (udeb)
crypto-modules-2.6.31-214-dove-di - crypto modules (udeb)
fat-modules-2.6.31-214-dove-di - FAT filesystem support (udeb)
firewire-core-modules-2.6.31-214-dove-di - Core FireWire drivers (udeb)
fs-core-modules-2.6.31-214-dove-di - Base filesystem modules (udeb)
fs-secondary-modules-2.6.31-214-dove-di - Extra filesystem modules (udeb)
input-modules-2.6.31-214-dove-di - Support for various input methods (udeb)
kernel-image-2.6.31-214-dove-di - Linux kernel binary image for the Debian
installer (udeb)
linux-headers-2.6.31-214 - Header files related to linux-mvl-dove kernel
version 2.6.31
linux-headers-2.6.31-214-dove - Linux kernel headers for version 2.6.31 on
dove-based systems
linux-headers-2.6.31-214-dove-z0 - Linux kernel headers for version 2.6.31 on
dove-based systems
linux-image-2.6.31-214-dove - Linux kernel image for version 2.6.31 on
dove-based systems
linux-image-2.6.31-214-dove-z0 - Linux kernel image for version 2.6.31 on
dove-based systems
linux-image-debug-2.6.31-214-dove - Linux kernel debug image for version
2.6.31 on dove-based systems
linux-image-debug-2.6.31-214-dove-z0 - Linux kernel debug image for version
2.6.31 on dove-based systems
md-modules-2.6.31-214-dove-di - Multi-device support (raid, device-mapper,
lvm) (udeb)
mouse-modules-2.6.31-214-dove-di - Mouse support (udeb)
nfs-modules-2.6.31-214-dove-di - NFS filesystem drivers (udeb)
nic-modules-2.6.31-214-dove-di - Network interface support (udeb)
nic-shared-modules-2.6.31-214-dove-di - Shared NIC drivers (udeb)
nic-usb-modules-2.6.31-214-dove-di - USB network interface support (udeb)
parport-modules-2.6.31-214-dove-di - Parallel port support (udeb)
plip-modules-2.6.31-214-dove-di - PLIP (parallel port) networking support
(udeb)
ppp-modules-2.6.31-214-dove-di - PPP (serial port) networking support (udeb)
scsi-modules-2.6.31-214-dove-di - SCSI storage support (udeb)
usb-modules-2.6.31-214-dove-di - Core USB support (udeb)
Changes:
linux-mvl-dove (2.6.31-214.28) karmic-security; urgency=low
.
[ Stefan Bader ]
.
* Rebase to 2.6.31-22.60
.
[ Ubuntu: 2.6.31-22.60 ]
.
* kvm: restrict writing of segment selectors to segment registers
- CVE-2010-0419
* USB: usbfs: properly clean up the as structure on error paths
- CVE-2010-1083
* Bluetooth: Fix potential bad memory access with sysfs files
- CVE-2010-1084
* ALSA: hda-intel: Avoid divide by zero crash
- CVE-2010-1085
* dvb-core: Fix DoS bug in ULE decapsulation code that can be triggered
by an invalid Payload Pointer
- CVE-2010-1086
* GFS2: Skip check for mandatory locks when unlocking
- CVE-2010-0727
* tipc: Fix oops on send prior to entering networked mode (v3)
- CVE-2010-1187
* inotify: do not reuse watch descriptors
- LP: #485556
* idr: fix a critical misallocation bug, take#2
- LP: #485556
* tty: release_one_tty() forgets to put pids
- CVE-2010-1162
* reiserfs: fix permissions on .reiserfs_priv
- CVE-2010-1146
* fix LOOKUP_FOLLOW on automount "symlinks"
- CVE-2010-1088
* NFS: Fix an Oops when truncating a file
- CVE-2010-1087
* Attempt #2 to handle null nameidata
- CVE-2010-1148
* r8169: Fix receive buffer length when MTU is between 1515 and 1536
- CVE-2009-4537
* r8169: offical fix for CVE-2009-4537 (overlength frame DMAs)
- CVE-2009-4537
* KVM: Use kvm_{read,write}_guest_virt() to read and write segment
descriptors
- CVE-2010-0298
- CVE-2010-0306
* KVM: x86 emulator: Check CPL level during privilege instruction
emulation
- CVE-2010-0298
- CVE-2010-0306
* KVM: x86 emulator: Add Virtual-8086 mode of emulation
- CVE-2010-0298
- CVE-2010-0306
* KVM: x86 emulator: fix memory access during x86 emulation
- CVE-2010-0298
- CVE-2010-0306
* KVM: x86 emulator: Check IOPL level during io instruction emulation
- CVE-2010-0298
- CVE-2010-0306
* KVM: x86 emulator: Fix popf emulation
- CVE-2010-0298
- CVE-2010-0306
* KVM: VMX: Use macros instead of hex value on cr0 initialization
- CVE-2010-0298
- CVE-2010-0306
* KVM: SVM: Reset cr0 properly on vcpu reset
- CVE-2010-0298
- CVE-2010-0306
* KVM: x86: disable paravirt mmu reporting
- CVE-2010-0298
- CVE-2010-0306
Checksums-Sha1:
f69a42f70c664252628b98851824f80528ccf869 2214 linux-mvl-dove_2.6.31-214.28.dsc
587f642222d3223c45394a1e30f89d4506834b82 4613937
linux-mvl-dove_2.6.31-214.28.diff.gz
Checksums-Sha256:
aedf8c350a5dbdc7873993145c156277b7b999229b921cc707541e830f327ad6 2214
linux-mvl-dove_2.6.31-214.28.dsc
e2dae38ff333c0d3f4a00e90b59a16f72215088df448811612809d30f261091a 4613937
linux-mvl-dove_2.6.31-214.28.diff.gz
Files:
2387eb27814bd67f0788fd0450f400ab 2214 devel optional
linux-mvl-dove_2.6.31-214.28.dsc
a6d34bc737f45065a7856ca478f09ded 4613937 devel optional
linux-mvl-dove_2.6.31-214.28.diff.gz
Launchpad-Bugs-Fixed: 485556 485556
--
Karmic-changes mailing list
[email protected]
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/karmic-changes