This bug was fixed in the package linux - 2.6.35-30.61 --------------- linux (2.6.35-30.61) maverick-proposed; urgency=low
[Herton R. Krzesinski] * Release Tracking Bug - LP: #871912 [ Stefan Bader ] * [Config] Include all filesystem modules for virtual - LP: #761809 [ Upstream Kernel Changes ] * crypto: Move md5_transform to lib/md5.c, CVE-2011-3188 - LP: #834129 - CVE-2011-3188 * net: Compute protocol sequence numbers and fragment IDs using MD5, CVE-2011-3188 - LP: #834129 - CVE-2011-3188 * ext4: Fix max file size and logical block counting of extent format file, CVE-2011-2695 - LP: #819574 - CVE-2011-2695 * cifs: add fallback in is_path_accessible for old servers, CVE-2011-3363 - LP: #866034 - CVE-2011-3363 * Make TASKSTATS require root access, CVE-2011-2494 - LP: #866021 - CVE-2011-2494 * proc: restrict access to /proc/PID/io, CVE-2011-2495 - LP: #866025 - CVE-2011-2495 * proc: fix a race in do_io_accounting(), CVE-2011-2495 - LP: #866025 - CVE-2011-2495 * inotify: fix double free/corruption of stuct user - LP: #869203 - CVE-2011-1479 * staging: comedi: fix infoleak to userspace, CVE-2011-2909 - LP: #869261 - CVE-2011-2909 * perf tools: do not look at ./config for configuration, CVE-2011-2905 - LP: #869259 - CVE-2011-2905 -- Herton Ronaldo Krzesinski <herton.krzesin...@canonical.com> Mon, 10 Oct 2011 14:37:08 -0300 ** Changed in: linux (Ubuntu Maverick) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1479 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2494 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2495 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2905 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2909 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-3363 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/761809 Title: Quota modules are missing from the package To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/761809/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs