This bug was fixed in the package linux - 2.6.24-29.90
---------------
linux (2.6.24-29.90) hardy-proposed; urgency=low
[ Herton R. Krzesinski ]
* Release Tracking Bug
- LP: #788843
[Upstream Kernel Changes]
* IB/cm: Bump reference count on cm_id before invoking callback,
CVE-2011-0695
- LP: #770369
- CVE-2011-0695
* RDMA/cma: Fix crash in request handlers, CVE-2011-0695
- LP: #770369
- CVE-2011-0695
* ALSA: caiaq - Fix possible string-buffer overflow, CVE-2011-0712
- LP: #768448
- CVE-2011-0712
* Treat writes as new when holes span across page boundaries,
CVE-2011-0463
- LP: #770483
- CVE-2011-0463
* net: clear heap allocations for privileged ethtool actions,
CVE-2010-4655
- LP: #771445
- CVE-2010-4655
* usb: iowarrior: don't trust report_size for buffer size, CVE-2010-4656
- LP: #711484
- CVE-2010-4656
* fs/partitions/ldm.c: fix oops caused by corrupted partition table,
CVE-2011-1017
- LP: #771382
- CVE-2011-1017
* ldm: corrupted partition table can cause kernel oops, CVE-2011-1017
- LP: #771382
- CVE-2011-1017
* next_pidmap: fix overflow condition, CVE-2011-1593
- LP: #784727
- CVE-2011-1593
* proc: do proper range check on readdir offset, CVE-2011-1593
- LP: #784727
- CVE-2011-1593
-- Herton Ronaldo Krzesinski <[email protected]> Thu, 26 May
2011 18:15:42 -0300
** Changed in: linux (Ubuntu)
Status: In Progress => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4656
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-0463
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-0695
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-0712
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1593
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/788843
Title:
linux: 2.6.24-29.90 -proposed tracker
To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/788843/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs