This bug was fixed in the package linux-lts-backport-maverick -
2.6.35-30.59~lucid1
---------------
linux-lts-backport-maverick (2.6.35-30.59~lucid1) lucid-proposed; urgency=low
[Herton R. Krzesinski]
* Release Tracking Bug
- LP: #838043
[ Upstream Kernel Changes ]
* Revert "drm/nv50-nvc0: work around an evo channel hang that some people
see"
* Revert "eCryptfs: Handle failed metadata read in lookup"
linux (2.6.35-30.58) maverick-proposed; urgency=low
[Herton R. Krzesinski]
* Release Tracking Bug
- LP: #828376
[ Upstream Kernel Changes ]
* proc: fix oops on invalid /proc/<pid>/maps access, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
linux (2.6.35-30.57) maverick-proposed; urgency=low
[Herton R. Krzesinski]
* Release Tracking Bug
- LP: #823306
[ Tim Gardner ]
* SAUCE: rtl8192se: Force a build for a 2.6/3.0 kernel
- LP: #805494
* [Config] Add enic/fnic to udebs
- LP: #801610
[ Upstream Kernel Changes ]
* taskstats: don't allow duplicate entries in listener mode,
CVE-2011-2484
- LP: #806390
- CVE-2011-2484
* dccp: handle invalid feature options length, CVE-2011-1770
- LP: #806375
- CVE-2011-1770
* eCryptfs: Handle failed metadata read in lookup
- LP: #509180
* pagemap: close races with suid execve, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
* report errors in /proc/*/*map* sanely, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
* close race in /proc/*/environ, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
* auxv: require the target to be tracable (or yourself), CVE-2011-1020
- LP: #813026
- CVE-2011-1020
* deal with races in /proc/*/{syscall, stack, personality}, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
* rose: Add length checks to CALL_REQUEST parsing, CVE-2011-1493
- LP: #816550
- CVE-2011-1493
* Bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace.
- LP: #819569
- CVE-2011-2492
* drm/nv50-nvc0: work around an evo channel hang that some people see
- LP: #583760
linux (2.6.35-30.56) maverick-proposed; urgency=low
[Herton R. Krzesinski]
* Release Tracking Bug
- LP: #808934
[ Herton Ronaldo Krzesinski ]
* Revert "SAUCE: mmc: Enable MMC card reader for RICOH [1180:e823]"
[ Upstream Kernel Changes ]
* Revert "x86: Flush TLB if PGD entry is changed in i386 PAE mode"
- LP: #805209
-- Herton Ronaldo Krzesinski <[email protected]> Thu, 01 Sep
2011 13:40:57 -0300
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
Status: New => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1020
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1493
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1770
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2484
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2492
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/838043
Title:
linux-lts-backport-maverick: 2.6.35-30.59~lucid1 -proposed tracker
To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/838043/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs