This bug was fixed in the package linux - 2.6.24-29.94
---------------
linux (2.6.24-29.94) hardy-proposed; urgency=low
[Herton R. Krzesinski]
* Release Tracking Bug
- LP: #853945
[Upstream Kernel Changes]
* ipv6: make fragment identifications less predictable, CVE-2011-2699
- LP: #827685
- CVE-2011-2699
* splice: fix infinite loop in generic_file_splice_read()
- LP: #790557
* cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191
- LP: #834135
- CVE-2011-3191
* befs: ensure fast symlinks are NUL-terminated, CVE-2011-2928
- LP: #834124
- CVE-2011-2928
* befs: Validate length of long symbolic links, CVE-2011-2928
- LP: #834124
- CVE-2011-2928
* Validate size of EFI GUID partition entries, CVE-2011-1776
- LP: #844365
- CVE-2011-1776
* inet_diag: fix inet_diag_bc_audit(), CVE-2011-2213
- LP: #838421
- CVE-2011-2213
* Bluetooth: Prevent buffer overflow in l2cap config request,
CVE-2011-2497
- LP: #838423
- CVE-2011-2497
-- Herton Ronaldo Krzesinski <[email protected]> Mon, 19 Sep
2011 12:24:41 -0300
** Changed in: linux (Ubuntu Hardy)
Status: New => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1776
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2213
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2497
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2699
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2928
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3191
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/853945
Title:
linux: 2.6.24-29.94 -proposed tracker
To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/853945/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs