This bug was fixed in the package linux-ti-omap4 - 2.6.38-1209.18 --------------- linux-ti-omap4 (2.6.38-1209.18) natty-proposed; urgency=low
* Release Tracking Bug - LP: #897566 [ Upstream Kernel Changes ] * crypto: ghash - Avoid null pointer dereference if no key is set - LP: #887299 - CVE-2011-4081 * xfs: Fix possible memory corruption in xfs_readlink, CVE-2011-4077 - LP: #887298 - CVE-2011-4077 * jbd/jbd2: validate sb->s_first in journal_get_superblock() - LP: #893148 - CVE-2011-4132 * inetpeer: reduce stack usage, CVE-2011-4087 - LP: #887302 - CVE-2011-4087 * hfs: add sanity check for file name length, CVE-2011-4330 - LP: #894374 - CVE-2011-4330 * ipv6: udp: fix the wrong headroom check - LP: #894373 - CVE-2011-4326 -- Paolo Pisati <paolo.pis...@canonical.com> Fri, 02 Dec 2011 13:15:41 +0100 ** Changed in: linux-ti-omap4 (Ubuntu Natty) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-4087 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/894374 Title: CVE-2011-4330 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/894374/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs