This bug was fixed in the package linux - 2.6.28-18.60 --------------- linux (2.6.28-18.60) jaunty-security; urgency=low
[ Surbhi Palande ] * Revert "[Upstream] e1000: enhance frame fragment detection" - CVE-2009-4536 * Revert "[Upstream] e1000e: enhance frame fragment detection" - CVE-2009-4538 [ Upstream Kernel Changes ] * e1000: enhance frame fragment detection - CVE-2009-4536 * e1000/e1000e: don't use small hardware rx buffers - CVE-2009-4538 * e1000e: enhance frame fragment detection - CVE-2009-4538 * KVM: PIT: control word is write-only - CVE-2010-0309 * connector: Delete buggy notification code. - CVE-2010-0410 * Fix potential crash with sys_move_pages - CVE-2010-0415 * futex: Handle user space corruption gracefully - CVE-2010-0622 * x86: Increase MIN_GAP to include randomized stack - LP: #504164 * Split 'flush_old_exec' into two functions - CVE-2010-0307 * Fix 'flush_old_exec()/setup_new_exec()' split - CVE-2010-0307 * x86: get rid of the insane TIF_ABI_PENDING bit - CVE-2010-0307 * powerpc: TIF_ABI_PENDING bit removal - CVE-2010-0307 * sparc: TIF_ABI_PENDING bit removal - CVE-2010-0307 * x86: set_personality_ia32() misses force_personality32 - CVE-2010-0307 -- Stefan Bader <stefan.ba...@canonical.com> Tue, 09 Mar 2010 18:30:30 +0100 ** Changed in: linux (Ubuntu Jaunty) Status: In Progress => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2009-4536 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2009-4538 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-0307 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-0309 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-0410 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-0415 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-0622 ** Changed in: linux (Ubuntu Intrepid) Status: In Progress => Fix Released -- Random segfaults on amd64 (Hardy through Jaunty) https://bugs.launchpad.net/bugs/504164 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs