This bug was fixed in the package linux - 2.6.24-27.68 --------------- linux (2.6.24-27.68) hardy-security; urgency=low
[Stefan Bader] * xen: Remove TIF_ABI_PENDING bit - CVE-2010-0307 * openvz: Remove TIF_ABI_PENDING bit - CVE-2010-0307 * openvz: Adapt connector code patch - CVE-2010-0410 * rt: Remove TIF_ABI_PENDING bit - CVE-2010-0307 [Surbhi Palande] * Revert "[Upstream] e1000: enhance frame fragment detection" - CVE-2009-4536 * Revert "[Upstream] e1000e: enhance frame fragment detection" - CVE-2009-4538 [Upstream Kernel Changes] * e1000: enhance frame fragment detection - CVE-2009-4536 * e1000/e1000e: don't use small hardware rx buffers - CVE-2009-4536 * e1000e: enhance frame fragment detection - CVE-2009-4538 * connector: Delete buggy notification code. - CVE-2010-0410 * Fix potential crash with sys_move_pages - CVE-2010-0415 * futex: Handle user space corruption gracefully - CVE-2010-0622 * x86: Increase MIN_GAP to include randomized stack - LP: #504164 * Split 'flush_old_exec' into two functions - CVE-2010-0307 * Fix 'flush_old_exec()/setup_new_exec()' split - CVE-2010-0307 * x86: get rid of the insane TIF_ABI_PENDING bit - CVE-2010-0307 * powerpc: TIF_ABI_PENDING bit removal - CVE-2010-0307 * sparc: TIF_ABI_PENDING bit removal - CVE-2010-0307 * x86: set_personality_ia32() misses force_personality32 - CVE-2010-0307 -- Stefan Bader <stefan.ba...@canonical.com> Tue, 09 Mar 2010 22:21:39 +0100 -- Random segfaults on amd64 (Hardy through Jaunty) https://bugs.launchpad.net/bugs/504164 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs