This bug was fixed in the package linux - 2.6.24-24.57

---------------
linux (2.6.24-24.57) hardy-security; urgency=low

  [Upstream Kernel Changes]

  * Add '-fno-delete-null-pointer-checks' to gcc CFLAGS
    - LP: #403647
  * personality: fix PER_CLEAR_ON_SETID
    - CVE-2009-1895
  * KVM: detect if VCPU triple faults
    - CVE-2009-2287
  * KVM: x86: check for cr3 validity in ioctl_set_sregs
    - CVE-2009-2287
  * r8169: fix crash when large packets are received
    - CVE-2009-1389
  * eCryptfs: Check Tag 11 literal data buffer size
    - CVE-2009-2406
  * eCryptfs: parse_tag_3_packet check tag 3 packet encrypted key size
    - CVE-2009-2407

 -- Stefan Bader <stefan.ba...@canonical.com>   Thu, 23 Jul 2009
15:37:05 +0200

** Changed in: linux (Ubuntu Hardy)
       Status: Triaged => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-1389

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-1895

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-2287

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-2406

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-2407

** Changed in: linux (Ubuntu Intrepid)
       Status: Triaged => Fix Released

-- 
compiled without -fno-delete-null-pointer-checks
https://bugs.launchpad.net/bugs/403647
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to