This bug was fixed in the package linux - 2.6.24-24.57 --------------- linux (2.6.24-24.57) hardy-security; urgency=low
[Upstream Kernel Changes] * Add '-fno-delete-null-pointer-checks' to gcc CFLAGS - LP: #403647 * personality: fix PER_CLEAR_ON_SETID - CVE-2009-1895 * KVM: detect if VCPU triple faults - CVE-2009-2287 * KVM: x86: check for cr3 validity in ioctl_set_sregs - CVE-2009-2287 * r8169: fix crash when large packets are received - CVE-2009-1389 * eCryptfs: Check Tag 11 literal data buffer size - CVE-2009-2406 * eCryptfs: parse_tag_3_packet check tag 3 packet encrypted key size - CVE-2009-2407 -- Stefan Bader <stefan.ba...@canonical.com> Thu, 23 Jul 2009 15:37:05 +0200 ** Changed in: linux (Ubuntu Hardy) Status: Triaged => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2009-1389 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2009-1895 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2009-2287 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2009-2406 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2009-2407 ** Changed in: linux (Ubuntu Intrepid) Status: Triaged => Fix Released -- compiled without -fno-delete-null-pointer-checks https://bugs.launchpad.net/bugs/403647 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs