This bug was fixed in the package linux - 2.6.24-29.92 --------------- linux (2.6.24-29.92) hardy-proposed; urgency=low
[Herton R. Krzesinski] * Release Tracking Bug - LP: #812360 [Upstream Kernel Changes] * af_unix: limit unix_tot_inflight CVE-2010-4249 - LP: #769182 - CVE-2010-4249 * xfs: zero proper structure size for geometry calls CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * netfilter: ip_tables: fix infoleak to userspace CVE-2011-1171 - LP: #801482 - CVE-2011-1171 * econet: 4 byte infoleak to the network CVE-2011-1173 - LP: #801484 - CVE-2011-1173 * netfilter: arp_tables: fix infoleak to userspace CVE-2011-1170 - LP: #801480 * ipv6: netfilter: ip6_tables: fix infoleak to userspace CVE-2011-1172 - LP: #801483 - CVE-2011-1172 * xen: don't allow blkback virtual CDROM device, CVE-2010-4238 - LP: #803931 - CVE-2010-4238 * IB/uverbs: Handle large number of entries in poll CQ CVE-2010-4649 - LP: #805512 * ipc: initialize structure memory to zero for compat functions CVE-2010-4073 - LP: #806366 - CVE-2010-4073 * tcp: Increase TCP_MAXSEG socket option minimum CVE-2010-4165 - LP: #806374 - CVE-2010-4165 * taskstats: don't allow duplicate entries in listener mode, CVE-2011-2484 - LP: #806390 - CVE-2011-2484 * netfilter: ipt_CLUSTERIP: fix buffer overflow, CVE-2011-2534 - LP: #801473 - CVE-2011-2534 * nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab (v3), CVE-2011-1090 - LP: #800775 - CVE-2011-1090 * fs/partitions: Validate map_count in Mac partition tables - LP: #804225 - CVE-2011-1010 -- Herton Ronaldo Krzesinski <herton.krzesin...@canonical.com> Mon, 18 Jul 2011 12:36:01 -0300 ** Changed in: linux (Ubuntu Hardy) Status: Incomplete => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4073 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4165 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4238 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4649 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-0711 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1010 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1090 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1170 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1171 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1172 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1173 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2484 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2534 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/769182 Title: CVE-2010-4249 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/769182/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs