linux-ti-omap (2.6.33-502.10) lucid-security; urgency=low

  [ Upstream Kernel Changes ]

  * drm: Initialize ioctl struct when no user data is present
    - CVE-2010-2803
  * can: add limit for nframes and clean up signed/unsigned variables
    - CVE-2010-2959
  * mm: keep a guard page below a grow-down stack segment
    - CVE-2010-2240
  * mm: fix missing page table unmap for stack guard page failure case
    - CVE-2010-2240
  * mm: fix page table unmap for stack guard page properly
    - CVE-2010-2240
  * mm: fix up some user-visible effects of the stack guard page
    - CVE-2010-2240
  * x86: don't send SIGBUS for kernel page faults
    - CVE-2010-2240

Date: Wed, 18 Aug 2010 15:50:33 +0200
Changed-By: Stefan Bader <[email protected]>
Maintainer: Ubuntu Kernel Team <[email protected]>
https://launchpad.net/ubuntu/lucid/+source/linux-ti-omap/2.6.33-502.10
Format: 1.8
Date: Wed, 18 Aug 2010 15:50:33 +0200
Source: linux-ti-omap
Binary: linux-headers-2.6.33-502 linux-image-2.6.33-502-omap 
linux-headers-2.6.33-502-omap linux-image-2.6.33-502-omap-dbgsym
Architecture: source
Version: 2.6.33-502.10
Distribution: lucid-security
Urgency: low
Maintainer: Ubuntu Kernel Team <[email protected]>
Changed-By: Stefan Bader <[email protected]>
Description: 
 linux-headers-2.6.33-502 - Header files related to linux-ti-omap kernel 
version 2.6.33
 linux-headers-2.6.33-502-omap - Linux kernel headers for version 2.6.33 on 
OMAP3-based systems
 linux-image-2.6.33-502-omap - Linux kernel image for version 2.6.33 on 
OMAP3-based systems
 linux-image-2.6.33-502-omap-dbgsym - Linux kernel debug image for version 
2.6.33 on OMAP3-based system
Changes: 
 linux-ti-omap (2.6.33-502.10) lucid-security; urgency=low
 .
   [ Upstream Kernel Changes ]
 .
   * drm: Initialize ioctl struct when no user data is present
     - CVE-2010-2803
   * can: add limit for nframes and clean up signed/unsigned variables
     - CVE-2010-2959
   * mm: keep a guard page below a grow-down stack segment
     - CVE-2010-2240
   * mm: fix missing page table unmap for stack guard page failure case
     - CVE-2010-2240
   * mm: fix page table unmap for stack guard page properly
     - CVE-2010-2240
   * mm: fix up some user-visible effects of the stack guard page
     - CVE-2010-2240
   * x86: don't send SIGBUS for kernel page faults
     - CVE-2010-2240
Checksums-Sha1: 
 413cf0ed5c6300b3ce4cc99dfb3ad86a02708298 1408 linux-ti-omap_2.6.33-502.10.dsc
 940244a3fbcfb7b9b7c9d4db7f8e8dd4f7876243 3442637 
linux-ti-omap_2.6.33-502.10.diff.gz
Checksums-Sha256: 
 e78e462fe20d77c53332f96ed61695607cf1c4005d3a8275c4a60b75ca3ae8cf 1408 
linux-ti-omap_2.6.33-502.10.dsc
 4c3488066878139db565b8aaa35bf54caf4b8f7cb4335f81525ed0fd82756891 3442637 
linux-ti-omap_2.6.33-502.10.diff.gz
Files: 
 715ad2bccd28a85c56006ed613e59b27 1408 devel optional 
linux-ti-omap_2.6.33-502.10.dsc
 0ef8b9d727514a85d33f868abf2cc9ee 3442637 devel optional 
linux-ti-omap_2.6.33-502.10.diff.gz
-- 
Lucid-changes mailing list
[email protected]
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/lucid-changes

Reply via email to