This bug was fixed in the package linux - 2.6.24-29.92
---------------
linux (2.6.24-29.92) hardy-proposed; urgency=low
[Herton R. Krzesinski]
* Release Tracking Bug
- LP: #812360
[Upstream Kernel Changes]
* af_unix: limit unix_tot_inflight CVE-2010-4249
- LP: #769182
- CVE-2010-4249
* xfs: zero proper structure size for geometry calls CVE-2011-0711
- LP: #767740
- CVE-2011-0711
* netfilter: ip_tables: fix infoleak to userspace CVE-2011-1171
- LP: #801482
- CVE-2011-1171
* econet: 4 byte infoleak to the network CVE-2011-1173
- LP: #801484
- CVE-2011-1173
* netfilter: arp_tables: fix infoleak to userspace CVE-2011-1170
- LP: #801480
* ipv6: netfilter: ip6_tables: fix infoleak to userspace CVE-2011-1172
- LP: #801483
- CVE-2011-1172
* xen: don't allow blkback virtual CDROM device, CVE-2010-4238
- LP: #803931
- CVE-2010-4238
* IB/uverbs: Handle large number of entries in poll CQ CVE-2010-4649
- LP: #805512
* ipc: initialize structure memory to zero for compat functions
CVE-2010-4073
- LP: #806366
- CVE-2010-4073
* tcp: Increase TCP_MAXSEG socket option minimum CVE-2010-4165
- LP: #806374
- CVE-2010-4165
* taskstats: don't allow duplicate entries in listener mode,
CVE-2011-2484
- LP: #806390
- CVE-2011-2484
* netfilter: ipt_CLUSTERIP: fix buffer overflow, CVE-2011-2534
- LP: #801473
- CVE-2011-2534
* nfs4: Ensure that ACL pages sent over NFS were not allocated from the
slab (v3), CVE-2011-1090
- LP: #800775
- CVE-2011-1090
* fs/partitions: Validate map_count in Mac partition tables
- LP: #804225
- CVE-2011-1010
-- Herton Ronaldo Krzesinski <[email protected]> Mon, 18 Jul
2011 12:36:01 -0300
** Changed in: linux (Ubuntu Hardy)
Status: Fix Committed => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4073
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4165
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4238
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4649
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-0711
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1010
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1170
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1171
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1172
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1173
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2484
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2534
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/800775
Title:
CVE-2011-1090
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/800775/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs