This bug was fixed in the package linux - 2.6.27-17.46

---------------
linux (2.6.27-17.46) intrepid-security; urgency=low

  [ Surbhi Palande ]

  * Revert "[Upstream] e1000: enhance frame fragment detection"
    - CVE-2009-4536
  * Revert "[Upstream] e1000e: enhance frame fragment detection"
    - CVE-2009-4538

  [ Upstream Kernel Changes ]

  * e1000: enhance frame fragment detection
    - CVE-2009-4536
  * e1000/e1000e: don't use small hardware rx buffers
    - CVE-2009-4538
  * e1000e: enhance frame fragment detection
    - CVE-2009-4538
  * KVM: PIT: control word is write-only
    - CVE-2010-0309
  * connector: Delete buggy notification code.
    - CVE-2010-0410
  * Fix potential crash with sys_move_pages
    - CVE-2010-0415
  * futex: Handle user space corruption gracefully
    - CVE-2010-0622
  * x86: Increase MIN_GAP to include randomized stack
    - LP: #504164
  * Split 'flush_old_exec' into two functions
    - CVE-2010-0307
  * Fix 'flush_old_exec()/setup_new_exec()' split
    - CVE-2010-0307
  * x86: get rid of the insane TIF_ABI_PENDING bit
    - CVE-2010-0307
  * powerpc: TIF_ABI_PENDING bit removal
    - CVE-2010-0307
  * sparc: TIF_ABI_PENDING bit removal
    - CVE-2010-0307
  * x86: set_personality_ia32() misses force_personality32
    - CVE-2010-0307
 -- Stefan Bader <stefan.ba...@canonical.com>   Tue, 09 Mar 2010 20:46:15 +0100

** Changed in: linux (Ubuntu Hardy)
       Status: In Progress => Fix Released

-- 
Random segfaults on amd64 (Hardy through Jaunty)
https://bugs.launchpad.net/bugs/504164
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to