This bug was fixed in the package linux - 2.6.24-29.91 --------------- linux (2.6.24-29.91) hardy-proposed; urgency=low
[Steve Conklin] * Release Tracking Bug - LP: #801636 [Andy Whitcroft] * custom binaries need VERSION_SIGNATURE updated during prepare - LP: #794698 [Stefan Bader] * (config) Disable COMPAT_VDSO for i386 Xen kernels - LP: #794715 * XEN: Add yield points to blktap and blkback - LP: #791212 - CVE-2010-4247 * xen: Fix memory corruption caused by double free - LP: #705562 [Upstream Kernel Changes] * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * agp: fix OOM and buffer overflow - LP: #791918 - CVE-2011-1746 * tty: icount changeover for other main devices, CVE-2010-4076, CVE-2010-4077 - LP: #794034 - CVE-2010-4077 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * proc: avoid information leaks to non-privileged processes - LP: #799906 - CVE-2011-0726 * proc: protect mm start_code/end_code in /proc/pid/stat - LP: #799906 - CVE-2011-0726 * sctp: Fix a race between ICMP protocol unreachable and connect() - LP: #799828 - CVE-2010-4526 * xen: blkback, blktap: Fix potential resource leak - LP: #800254 -- Steve Conklin <sconk...@canonical.com> Fri, 24 Jun 2011 10:59:11 -0500 ** Changed in: linux (Ubuntu Hardy) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4076 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4077 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4247 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4526 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-0726 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1163 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1577 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1746 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/794698 Title: hardy custom binary kernels have incorrect version reported in /proc/version_signature To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/794698/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs