** Description changed:
CVE-2010-4249
Vegard Nossum found a unix socket OOM was possible, posting an exploit
program.
My analysis is we can eat all LOWMEM memory before unix_gc() being
called from unix_release_sock(). Moreover, the thread blocked in
unix_gc() can consume huge amo
** Changed in: linux (Ubuntu)
Status: Incomplete => Fix Released
** Changed in: linux (Ubuntu Natty)
Status: Invalid => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu.
http
linux (2.6.32-28.55) lucid-proposed; urgency=low
* Another version bump because of abi check failure
* Tracking Bug
- LP: #699885
linux (2.6.32-28.54) lucid-proposed; urgency=low
* Another version bump because of upload failure
linux (2.6.32-28.53) lucid-proposed; urgency=low
* Ano
This was fixed in lucid, maverick, and natty according to
http://people.canonical.com/~ubuntu-security/cve/2010/CVE-2010-4249.html
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-0435
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4169
--
You receive
linux (2.6.35-25.44) maverick-proposed; urgency=low
[ Upstream Kernel Changes ]
* Revert "drm/radeon/kms: properly compute group_size on 6xx/7xx"
- LP: #703553
linux (2.6.35-25.43) maverick-proposed; urgency=low
[ Brad Figg ]
- LP: #697948
[ Andy Whitcroft ]
* [Config] add vm
** Tags added: kernel-cve-tracking-bug
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu.
https://bugs.launchpad.net/bugs/769182
Title:
CVE-2010-4249
Status in linux package in Ubuntu:
Incomplete
S
This release has reached end-of-life [0].
[0] https://wiki.ubuntu.com/Releases
** Changed in: linux (Ubuntu Maverick)
Status: Incomplete => Invalid
** Changed in: linux (Ubuntu Natty)
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of
7 matches
Mail list logo