linux-source-2.6.22 (2.6.22-14.47) gutsy-security; urgency=low [Security]
* wait_task_stopped: Check p->exit_state instead of TASK_TRACED (CVE-2007-5500) * [TCP]: Make sure write_queue_from does not begin with NULL ptr (CVE-2007-5501) * [IEEE80211]: avoid integer underflow for runt rx frames (CVE-2007-4997) * [JFFS2] Fix ACL vs. mode handling. (CVE-2007-4849) * minixfs: limit minixfs printks on corrupted dir i_size (CVE-2006-6058) * NFS: Fix the mount regression [Fabio Massimo Di Nitto] * fix DLM regression [Tim Gardner] * linux-image postinst matches header_postinst_hook for postinst_hook incorrectly - LP: #125816 [Upstream Kernel Changes] * [SPARC64]: Fix bugs in SYSV IPC handling in 64-bit processes. * [SPARC64]: Fix register usage in xor_raid_4(). * [NIU]: Fix write past end of array in niu_pci_probe_sprom(). * [NIU]: getting rid of __ucmpdi2 in niu.o * [SPARC64]: Do not use alloc_bootmem*low(). * [SPARC64]: Fix bogus '&' conditinal in set_rtc_mmss(). * [FUTEX]: Fix address computation in compat code. * [NIU]: Fix link LED handling. * [SPARC64]: Fix memory controller register access when non-SMP. * [SPARC64]: Fix endless loop in cheetah_xcall_deliver(). * [SPARC64]: Fix two kernel linear mapping setup bugs. -- Phillip Lougher <[EMAIL PROTECTED]> Thu, 13 Dec 2007 23:57:58 +0000 ** Changed in: linux-source-2.6.22 (Ubuntu) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2006-6058 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2007-4849 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2007-4997 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2007-5500 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2007-5501 -- linux-image postinst matches header_postinst_hook for postinst_hook incorrectly https://bugs.launchpad.net/bugs/125816 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs