This bug was fixed in the package linux - 2.6.24-27.65
---------------
linux (2.6.24-27.65) hardy-security; urgency=low
[Leann Ogasawara]
* [Upstream] e1000: enhance frame fragment detection
- CVE-2009-4536
* [Upstream] e1000e: enhance frame fragment detection
- CVE-2009-4538
* OPENVZ: untangle the do_mremap() mess
- CVE-2010-0291
* XEN: untangle the do_mremap() mess
- CVE-2010-0291
[Tim Gardner]
* (config) Enable ipv6 filter modules on virtual flavour
- LP: #487010
[Upstream Kernel Changes]
* hfs: fix a potential buffer overflow
- CVE-2009-4020
* fuse: prevent fuse_put_request on invalid pointer
- CVE-2009-4021
* KVM: x86 emulator: limit instructions to 15 bytes
- CVE-2009-4031
* ext4: Avoid null pointer dereference when decoding EROFS w/o a journal
- CVE-2009-4308
* firewire: ohci: handle receive packets with a data length of zero
- CVE-2009-4138
* kernel/signal.c: fix kernel information leak with print-fatal-signals=1
- CVE-2010-0003
* netfilter: ebtables: enforce CAP_NET_ADMIN
- CVE-2010-0007
* untangle the do_mremap() mess
- CVE-2010-0291
-- Leann Ogasawara <[email protected]> Wed, 09 Dec 2009 17:16:25
+0000
** Changed in: linux (Ubuntu Hardy)
Status: Fix Committed => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-4020
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-4021
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-4031
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-4138
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-4308
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-4536
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-4538
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-0003
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-0007
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-0291
--
ip6table modules are not included in the -virtual kernel packages
https://bugs.launchpad.net/bugs/487010
You received this bug notification because you are a member of Ubuntu
Bugs, which is a direct subscriber.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs