This bug was fixed in the package linux - 2.6.28-18.60
--------------- linux (2.6.28-18.60) jaunty-security; urgency=low
[ Surbhi Palande ]
* Revert "[Upstream] e1000: enhance frame fragment detection" - CVE-2009-4536 * Revert "[Upstream] e1000e: enhance frame fragment detection" - CVE-2009-4538
[ Upstream Kernel Changes ]
* e1000: enhance frame fragment detection - CVE-2009-4536 * e1000/e1000e: don't use small hardware rx buffers - CVE-2009-4538 * e1000e: enhance frame fragment detection - CVE-2009-4538 * KVM: PIT: control word is write-only - CVE-2010-0309 * connector: Delete buggy notification code. - CVE-2010-0410 * Fix potential crash with sys_move_pages - CVE-2010-0415 * futex: Handle user space corruption gracefully - CVE-2010-0622 * x86: Increase MIN_GAP to include randomized stack - LP: #504164 * Split 'flush_old_exec' into two functions - CVE-2010-0307 * Fix 'flush_old_exec()/setup_new_exec()' split - CVE-2010-0307 * x86: get rid of the insane TIF_ABI_PENDING bit - CVE-2010-0307 * powerpc: TIF_ABI_PENDING bit removal - CVE-2010-0307 * sparc: TIF_ABI_PENDING bit removal - CVE-2010-0307 * x86: set_personality_ia32() misses force_personality32 - CVE-2010-0307 -- Stefan Bader <email address hidden> Tue, 09 Mar 2010 18:30:30 +0100
This bug was fixed in the package linux - 2.6.28-18.60
---------------
linux (2.6.28-18.60) jaunty-security; urgency=low
[ Surbhi Palande ]
* Revert "[Upstream] e1000: enhance frame fragment detection"
- CVE-2009-4536
* Revert "[Upstream] e1000e: enhance frame fragment detection"
- CVE-2009-4538
[ Upstream Kernel Changes ]
* e1000: enhance frame fragment detection old_exec( )/setup_ new_exec( )' split _ia32() misses force_personality32
- CVE-2009-4536
* e1000/e1000e: don't use small hardware rx buffers
- CVE-2009-4538
* e1000e: enhance frame fragment detection
- CVE-2009-4538
* KVM: PIT: control word is write-only
- CVE-2010-0309
* connector: Delete buggy notification code.
- CVE-2010-0410
* Fix potential crash with sys_move_pages
- CVE-2010-0415
* futex: Handle user space corruption gracefully
- CVE-2010-0622
* x86: Increase MIN_GAP to include randomized stack
- LP: #504164
* Split 'flush_old_exec' into two functions
- CVE-2010-0307
* Fix 'flush_
- CVE-2010-0307
* x86: get rid of the insane TIF_ABI_PENDING bit
- CVE-2010-0307
* powerpc: TIF_ABI_PENDING bit removal
- CVE-2010-0307
* sparc: TIF_ABI_PENDING bit removal
- CVE-2010-0307
* x86: set_personality
- CVE-2010-0307
-- Stefan Bader <email address hidden> Tue, 09 Mar 2010 18:30:30 +0100