This bug was fixed in the package linux - 2.6.24-29.94 --------------- linux (2.6.24-29.94) hardy-proposed; urgency=low
[Herton R. Krzesinski] * Release Tracking Bug - LP: #853945 [Upstream Kernel Changes] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * splice: fix infinite loop in generic_file_splice_read() - LP: #790557 * cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191 - LP: #834135 - CVE-2011-3191 * befs: ensure fast symlinks are NUL-terminated, CVE-2011-2928 - LP: #834124 - CVE-2011-2928 * befs: Validate length of long symbolic links, CVE-2011-2928 - LP: #834124 - CVE-2011-2928 * Validate size of EFI GUID partition entries, CVE-2011-1776 - LP: #844365 - CVE-2011-1776 * inet_diag: fix inet_diag_bc_audit(), CVE-2011-2213 - LP: #838421 - CVE-2011-2213 * Bluetooth: Prevent buffer overflow in l2cap config request, CVE-2011-2497 - LP: #838423 - CVE-2011-2497 -- Herton Ronaldo Krzesinski <herton.krzesin...@canonical.com> Mon, 19 Sep 2011 12:24:41 -0300 ** Changed in: linux (Ubuntu Hardy) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/834124 Title: CVE-2011-2928 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/834124/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs