This bug was fixed in the package linux - 2.6.32-25.45

---------------
linux (2.6.32-25.45) lucid-security; urgency=low

  [ Upstream Kernel Changes ]

  * v4l: disable dangerous buggy compat function
    - CVE-2010-2963
  * Local privilege escalation vulnerability in RDS sockets
    - CVE-2010-3904
  * mm: (pre-stable) Move vma_stack_continue into mm.h
    - LP: #646114
  * net sched: fix some kernel memory leaks
    - CVE-2010-2942
  * irda: Correctly clean up self->ias_obj on irda_bind() failure.
    - CVE-2010-2954
  * wireless extensions: fix kernel heap content leak
    - CVE-2010-2955
  * KEYS: Fix RCU no-lock warning in keyctl_session_to_parent()
    - CVE-2010-2960
  * KEYS: Fix bug in keyctl_session_to_parent() if parent has no session
    keyring
    - CVE-2010-2960
  * aio: check for multiplication overflow in do_io_submit
    - CVE-2010-3067
  * xfs: prevent reading uninitialized stack memory
    - CVE-2010-3078
  * ALSA: seq/oss - Fix double-free at error path of snd_seq_oss_open()
    - CVE-2010-3080
  * niu: Fix kernel buffer overflow for ETHTOOL_GRXCLSRLALL
    - CVE-2010-3084
  * rose: Fix signedness issues wrt. digi count.
    - CVE-2010-3310
  * sctp: Do not reset the packet during sctp_packet_config().
    - CVE-2010-3432
  * Fix pktcdvd ioctl dev_minor range check
    - CVE-2010-3437
  * ALSA: prevent heap corruption in snd_ctl_new()
    - CVE-2010-3442
  * net sched: fix kernel leak in act_police
    - CVE-2010-3477
  * Fix out-of-bounds reading in sctp_asoc_get_hmac()
    - CVE-2010-3705
  * ocfs2: Don't walk off the end of fast symlinks.
    - CVE-2010-NNN2
 -- Steve Conklin <sconk...@canonical.com>   Wed, 06 Oct 2010 16:16:20 +0100

** Changed in: linux (Ubuntu Lucid)
       Status: New => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2942

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2954

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2955

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2960

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2963

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3067

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3078

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3080

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3084

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3310

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3432

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3437

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3442

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3477

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3705

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3904

** Changed in: linux (Ubuntu Karmic)
       Status: New => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-4895

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2066

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2226

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2248

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2478

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2495

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2521

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2524

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2798

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2946

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3015

-- 
mlock on stack will create guard page gap
https://bugs.launchpad.net/bugs/646114
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to