This bug was fixed in the package linux - 2.6.24-31.99

---------------
linux (2.6.24-31.99) hardy-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
    - LP: #931627

  [Andy Whitcroft]

  * debian -- validate patches are applied to openvz etc

  [Stefan Bader]

  * SAUCE: Return deny all as default in encode_share_access
    - LP: #917829
    - CVE-2011-4324

  [Tim Gardner]

  * [Config] Generate patch set from flattened sources
  * [Config] Added apply-patch-to-binary-custom
  * [Config] Flattened openvz
  * [Config] Flattened xen

  [Upstream Kernel Changes]

  * sound/oss: remove offset from load_patch callbacks
    - LP: #925337
    - CVE-2011-1476
  * sound/oss/opl3: validate voice and channel indexes
    - LP: #925335
    - CVE-2011-1477
  * Fix for buffer overflow in ldm_frag_add not sufficient
    - LP: #922371
    - CVE-2011-2182
  * Move "exit_robust_list" into mm_release()
    - LP: #927889
    - CVE-2012-0028
  * futex: Nullify robust lists after cleanup
    - LP: #927889
    - CVE-2012-0028
 -- Herton Ronaldo Krzesinski <herton.krzesin...@canonical.com>   Mon, 13 Feb 
2012 17:25:53 -0200

** Changed in: linux (Ubuntu Hardy)
       Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1476

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1477

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2182

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-4324

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/927889

Title:
  CVE-2012-0028

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/927889/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to