This bug was fixed in the package linux - 2.6.24-29.95

---------------
linux (2.6.24-29.95) hardy-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
    - LP: #871844

  [Andy Whitcroft]

  * SAUCE: auerswald: validate the length of USB strings
    - LP: #869195
    - CVE-2009-4067

  [Upstream Kernel Changes]

  * crypto: Move md5_transform to lib/md5.c, CVE-2011-3188
    - LP: #834129
    - CVE-2011-3188
  * net: Compute protocol sequence numbers and fragment IDs using MD5,
    CVE-2011-3188
    - LP: #834129
    - CVE-2011-3188
  * Make TASKSTATS require root access, CVE-2011-2494
    - LP: #866021
    - CVE-2011-2494
  * proc: restrict access to /proc/PID/io, CVE-2011-2495
    - LP: #866025
    - CVE-2011-2495
  * sctp: fix to calc the INIT/INIT-ACK chunk length correctly is set,
    CVE-2011-1573
    - LP: #869205
    - CVE-2011-1573
 -- Herton Ronaldo Krzesinski <[email protected]>   Mon, 10 Oct 
2011 12:56:15 -0300

** Changed in: linux (Ubuntu Hardy)
       Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-4067

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2494

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2495

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3188

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/869205

Title:
  CVE-2011-1573

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/869205/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to