This bug was fixed in the package linux - 2.6.35-18.24
---------------
linux (2.6.35-18.24) maverick; urgency=low
[ Colin Watson ]
* Pass DEB_MAINT_PARAMS to hook scripts
[ Leann Ogasawara ]
* [Config] Add CONFIG_INPUT_UINPUT=y to config enforcer
- LP: #584812
* rebase to v2.6.35.3
[ Upstream Kernel Changes ]
* (pre-stable) dell-wmi: Add support for eject key on Dell Studio 1555
- LP: #609234
* can: add limit for nframes and clean up signed/unsigned variables
- CVE-2010-2959
* drm: Initialize ioctl struct when no user data is present
- CVE-2010-2803
* ARM: initial stack protector (-fstack-protector) support
* ARM: stack protector: change the canary value per task
* [ARM] implement arch_randomize_brk()
* [ARM] add address randomization to mmap()
* ARM: fix ASLR of PIE executables
-- Leann Ogasawara <email address hidden> Sun, 22 Aug 2010 19:22:04 -0700
This bug was fixed in the package linux - 2.6.35-18.24
---------------
linux (2.6.35-18.24) maverick; urgency=low
[ Colin Watson ]
* Pass DEB_MAINT_PARAMS to hook scripts
[ Leann Ogasawara ]
* [Config] Add CONFIG_ INPUT_UINPUT= y to config enforcer
- LP: #584812
* rebase to v2.6.35.3
[ Upstream Kernel Changes ]
* (pre-stable) dell-wmi: Add support for eject key on Dell Studio 1555 brk()
- LP: #609234
* can: add limit for nframes and clean up signed/unsigned variables
- CVE-2010-2959
* drm: Initialize ioctl struct when no user data is present
- CVE-2010-2803
* ARM: initial stack protector (-fstack-protector) support
* ARM: stack protector: change the canary value per task
* [ARM] implement arch_randomize_
* [ARM] add address randomization to mmap()
* ARM: fix ASLR of PIE executables
-- Leann Ogasawara <email address hidden> Sun, 22 Aug 2010 19:22:04 -0700