This bug was fixed in the package linux - 2.6.24-29.92

---------------
linux (2.6.24-29.92) hardy-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
    - LP: #812360

  [Upstream Kernel Changes]

  * af_unix: limit unix_tot_inflight CVE-2010-4249
    - LP: #769182
    - CVE-2010-4249
  * xfs: zero proper structure size for geometry calls CVE-2011-0711
    - LP: #767740
    - CVE-2011-0711
  * netfilter: ip_tables: fix infoleak to userspace CVE-2011-1171
    - LP: #801482
    - CVE-2011-1171
  * econet: 4 byte infoleak to the network CVE-2011-1173
    - LP: #801484
    - CVE-2011-1173
  * netfilter: arp_tables: fix infoleak to userspace CVE-2011-1170
    - LP: #801480
  * ipv6: netfilter: ip6_tables: fix infoleak to userspace CVE-2011-1172
    - LP: #801483
    - CVE-2011-1172
  * xen: don't allow blkback virtual CDROM device, CVE-2010-4238
    - LP: #803931
    - CVE-2010-4238
  * IB/uverbs: Handle large number of entries in poll CQ CVE-2010-4649
    - LP: #805512
  * ipc: initialize structure memory to zero for compat functions
    CVE-2010-4073
    - LP: #806366
    - CVE-2010-4073
  * tcp: Increase TCP_MAXSEG socket option minimum CVE-2010-4165
    - LP: #806374
    - CVE-2010-4165
  * taskstats: don't allow duplicate entries in listener mode,
    CVE-2011-2484
    - LP: #806390
    - CVE-2011-2484
  * netfilter: ipt_CLUSTERIP: fix buffer overflow, CVE-2011-2534
    - LP: #801473
    - CVE-2011-2534
  * nfs4: Ensure that ACL pages sent over NFS were not allocated from the
    slab (v3), CVE-2011-1090
    - LP: #800775
    - CVE-2011-1090
  * fs/partitions: Validate map_count in Mac partition tables
    - LP: #804225
    - CVE-2011-1010
 -- Herton Ronaldo Krzesinski <herton.krzesin...@canonical.com>   Mon, 18 Jul 
2011 12:36:01 -0300

** Changed in: linux (Ubuntu Hardy)
       Status: Incomplete => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4073

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4165

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4238

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4649

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-0711

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1010

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1090

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1170

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1171

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1172

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1173

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2484

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2534

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/769182

Title:
  CVE-2010-4249

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/769182/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to