This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.28
---------------
linux-ti-omap4 (2.6.35-903.28) maverick-proposed; urgency=low
* Release Tracking Bug
- LP: #897740
[ Upstream Kernel Changes ]
* crypto: ghash - Avoid null pointer dereference if no key is set
- LP: #887299
- CVE-2011-4081
* xfs: Fix possible memory corruption in xfs_readlink, CVE-2011-4077
- LP: #887298
- CVE-2011-4077
* jbd/jbd2: validate sb->s_first in journal_get_superblock()
- LP: #893148
- CVE-2011-4132
* hfs: add sanity check for file name length, CVE-2011-4330
- LP: #894374
- CVE-2011-4330
* ipv6: udp: fix the wrong headroom check
- LP: #894373
- CVE-2011-4326
* mm: make the vma list be doubly linked
- LP: #893190
* mm: make the mlock() stack guard page checks stricter
- LP: #893190
* mm: make stack guard page logic use vm_prev pointer
- LP: #893190
* mm: Move vma_stack_continue into mm.h
- LP: #672664, #893190
* Yama: fix default relationship to check thread group
- LP: #737676, #893190
* Yama: use thread group leader when creating match
- LP: #729839, #893190
-- Paolo Pisati <[email protected]> Fri, 02 Dec 2011 13:04:02 +0100
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148
Title:
CVE-2011-4132
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs