** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249
-- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/712615 Title: CVE-2010-0435 Status in linux package in Ubuntu: Fix Released Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux source package in Maverick: Fix Released Status in linux-mvl-dove source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux-mvl-dove source package in Natty: Invalid Status in linux source package in Dapper: Invalid Status in linux-mvl-dove source package in Dapper: Invalid Status in linux source package in Hardy: Fix Released Status in linux-mvl-dove source package in Hardy: Invalid Status in linux source package in Karmic: Fix Released Status in linux-mvl-dove source package in Karmic: Invalid Bug description: Gleb Napatov discovered that KVM did not correctly check certain privileged operations. A local attacker with access to a guest kernel could exploit this to crash the host system, leading to a denial of service. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/712615/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp