[ubuntu/hardy-security] linux (delayed), linux 2.6.24-28.70 (Accepted)

Ubuntu Installer archive at ubuntu.com
Thu Jun 3 01:08:44 BST 2010


linux (2.6.24-28.70) hardy-security; urgency=low

  [Stefan Bader]

  * OPENVZ: Fix patch failure on fs/namei.c
    - CVE-2010-1088
  * KVM: x86: Completely backport get_cpl functionality
    - CVE-2010-0298
    - CVE-2010-0306

  [Upstream Kernel Changes]

  * virtio: finer-grained features for virtio_net
    - CVE-2010-0741
  * virtio: explicit advertisement of driver features
    - CVE-2010-0741
  * USB: usbfs: properly clean up the as structure on error paths
    - CVE-2010-1083
  * Bluetooth: Fix potential bad memory access with sysfs files
    - CVE-2010-1084
  * dvb-core: Fix DoS bug in ULE decapsulation code that can be triggered
    by an invalid Payload Pointer
    - CVE-2010-1086
  * ipv6: Fix OOPS in ip6_dst_lookup_tail().
    - CVE-2010-0437
  * GFS2: Skip check for mandatory locks when unlocking
    - CVE-2010-0727
  * tipc: Fix oops on send prior to entering networked mode (v3)
    - CVE-2010-1187
  * idr: fix a critical misallocation bug, take#2
    - LP: #485556
  * tty: release_one_tty() forgets to put pids
    - CVE-2010-1162
  * fix LOOKUP_FOLLOW on automount "symlinks"
    - CVE-2010-1088
  * NFS: Fix an Oops when truncating a file
    - CVE-2010-1087
  * r8169: Fix receive buffer length when MTU is between 1515 and 1536
    - CVE-2009-4537
  * r8169: offical fix for CVE-2009-4537 (overlength frame DMAs)
    - CVE-2009-4537
  * KVM: introduce kvm_read_guest_virt, kvm_write_guest_virt
    - CVE-2010-0298
    - CVE-2010-0306
  * KVM: remove the vmap usage
    - CVE-2010-0298
    - CVE-2010-0306
  * KVM: x86 emulator: Check CPL level during privilege instruction
    emulation
    - CVE-2010-0298
    - CVE-2010-0306
  * KVM: x86 emulator: Add Virtual-8086 mode of emulation
    - CVE-2010-0298
    - CVE-2010-0306
  * KVM: x86 emulator: fix memory access during x86 emulation
    - CVE-2010-0298
    - CVE-2010-0306
  * KVM: x86 emulator: Check IOPL level during io instruction emulation
    - CVE-2010-0298
    - CVE-2010-0306
  * KVM: VMX: Use macros instead of hex value on cr0 initialization
    - CVE-2010-0298
    - CVE-2010-0306
  * KVM: SVM: Reset cr0 properly on vcpu reset
    - CVE-2010-0298
    - CVE-2010-0306

Date: Tue, 25 May 2010 12:14:20 +0000
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Maintainer: Ubuntu Kernel Team <kernel-team at lists.ubuntu.com>
https://launchpad.net/ubuntu/hardy/+source/linux/2.6.24-28.70
-------------- next part --------------
Format: 1.7
Date: Tue, 25 May 2010 12:14:20 +0000
Source: linux
Binary: linux-kernel-devel linux-source-2.6.24 linux-doc-2.6.24 linux-headers-2.6.24-28 linux-libc-dev linux-image-2.6.24-28-386 linux-headers-2.6.24-28-386 linux-image-debug-2.6.24-28-386 linux-image-2.6.24-28-generic linux-headers-2.6.24-28-generic linux-image-debug-2.6.24-28-generic linux-image-2.6.24-28-hppa32 linux-headers-2.6.24-28-hppa32 linux-image-2.6.24-28-hppa64 linux-headers-2.6.24-28-hppa64 linux-image-2.6.24-28-itanium linux-headers-2.6.24-28-itanium linux-image-2.6.24-28-mckinley linux-headers-2.6.24-28-mckinley linux-image-2.6.24-28-powerpc linux-headers-2.6.24-28-powerpc linux-image-2.6.24-28-powerpc-smp linux-headers-2.6.24-28-powerpc-smp linux-image-2.6.24-28-powerpc64-smp linux-headers-2.6.24-28-powerpc64-smp linux-image-2.6.24-28-server linux-headers-2.6.24-28-server linux-image-debug-2.6.24-28-server linux-image-2.6.24-28-sparc64 linux-headers-2.6.24-28-sparc64 linux-image-2.6.24-28-sparc64-smp linux-headers-2.6.24-28-sparc64-smp linux-image-2.6.24-28-virtual linux-headers-2.6.24-28-virtual linux-image-debug-2.6.24-28-virtual linux-image-2.6.24-28-lpia linux-headers-2.6.24-28-lpia linux-image-2.6.24-28-rt linux-headers-2.6.24-28-rt linux-image-2.6.24-28-lpiacompat linux-headers-2.6.24-28-lpiacompat linux-image-2.6.24-28-xen linux-headers-2.6.24-28-xen linux-image-2.6.24-28-openvz linux-headers-2.6.24-28-openvz
Architecture: source
Version: 2.6.24-28.70
Distribution: hardy-security
Urgency: low
Maintainer: Ubuntu Kernel Team <kernel-team at lists.ubuntu.com>
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Description: 
 linux-doc-2.6.24 - Linux kernel specific documentation for version 2.6.24
 linux-headers-2.6.24-28 - Header files related to Linux kernel version 2.6.24
 linux-headers-2.6.24-28-386 - Linux kernel headers for version 2.6.24 on i386
 linux-headers-2.6.24-28-generic - Linux kernel headers for version 2.6.24 on x86/x86_64
 linux-headers-2.6.24-28-hppa32 - Linux kernel headers for version 2.6.24 on 32-bit HP PA-RISC SMP
 linux-headers-2.6.24-28-hppa64 - Linux kernel headers for version 2.6.24 on 64-bit HP PA-RISC SMP
 linux-headers-2.6.24-28-itanium - Linux kernel headers for version 2.6.24 on Itanium SMP
 linux-headers-2.6.24-28-lpia - Linux kernel headers for version 2.6.24 on Ubuntu Moblie and Embe
 linux-headers-2.6.24-28-lpiacompat - Linux kernel headers for version 2.6.24 on Ubuntu Moblie and Embe
 linux-headers-2.6.24-28-mckinley - Linux kernel headers for version 2.6.24 on Itanium II SMP
 linux-headers-2.6.24-28-openvz - Linux kernel headers for version 2.6.24 on OpenVZ Virtualization 
 linux-headers-2.6.24-28-powerpc - Linux kernel headers for version 2.6.24 on 32-bit PowerPC
 linux-headers-2.6.24-28-powerpc-smp - Linux kernel headers for version 2.6.24 on 32-bit PowerPC SMP
 linux-headers-2.6.24-28-powerpc64-smp - Linux kernel headers for version 2.6.24 on 64-bit PowerPC SMP
 linux-headers-2.6.24-28-rt - Linux kernel headers for version 2.6.24 on Ingo Molnar's full rea
 linux-headers-2.6.24-28-server - Linux kernel headers for version 2.6.24 on x86/x86_64
 linux-headers-2.6.24-28-sparc64 - Linux kernel headers for version 2.6.24 on 64-bit UltraSPARC
 linux-headers-2.6.24-28-sparc64-smp - Linux kernel headers for version 2.6.24 on 64-bit UltraSPARC SMP
 linux-headers-2.6.24-28-virtual - Linux kernel headers for version 2.6.24 on x86
 linux-headers-2.6.24-28-xen - Linux kernel headers for version 2.6.24 on This kernel can be use
 linux-image-2.6.24-28-386 - Linux kernel image for version 2.6.24 on i386
 linux-image-2.6.24-28-generic - Linux kernel image for version 2.6.24 on x86/x86_64
 linux-image-2.6.24-28-hppa32 - Linux kernel image for version 2.6.24 on 32-bit HP PA-RISC SMP
 linux-image-2.6.24-28-hppa64 - Linux kernel image for version 2.6.24 on 64-bit HP PA-RISC SMP
 linux-image-2.6.24-28-itanium - Linux kernel image for version 2.6.24 on Itanium SMP
 linux-image-2.6.24-28-lpia - Linux kernel image for version 2.6.24 on Ubuntu Moblie and Embedd
 linux-image-2.6.24-28-lpiacompat - Linux kernel image for version 2.6.24 on Ubuntu Moblie and Embedd
 linux-image-2.6.24-28-mckinley - Linux kernel image for version 2.6.24 on Itanium II SMP
 linux-image-2.6.24-28-openvz - Linux kernel image for version 2.6.24 on OpenVZ Virtualization en
 linux-image-2.6.24-28-powerpc - Linux kernel image for version 2.6.24 on 32-bit PowerPC
 linux-image-2.6.24-28-powerpc-smp - Linux kernel image for version 2.6.24 on 32-bit PowerPC SMP
 linux-image-2.6.24-28-powerpc64-smp - Linux kernel image for version 2.6.24 on 64-bit PowerPC SMP
 linux-image-2.6.24-28-rt - Linux kernel image for version 2.6.24 on Ingo Molnar's full real 
 linux-image-2.6.24-28-server - Linux kernel image for version 2.6.24 on x86/x86_64
 linux-image-2.6.24-28-sparc64 - Linux kernel image for version 2.6.24 on 64-bit UltraSPARC
 linux-image-2.6.24-28-sparc64-smp - Linux kernel image for version 2.6.24 on 64-bit UltraSPARC SMP
 linux-image-2.6.24-28-virtual - Linux kernel image for version 2.6.24 on x86
 linux-image-2.6.24-28-xen - Linux kernel image for version 2.6.24 on This kernel can be used 
 linux-image-debug-2.6.24-28-386 - Linux kernel debug image for version 2.6.24 on i386
 linux-image-debug-2.6.24-28-generic - Linux kernel debug image for version 2.6.24 on x86/x86_64
 linux-image-debug-2.6.24-28-server - Linux kernel debug image for version 2.6.24 on x86/x86_64
 linux-image-debug-2.6.24-28-virtual - Linux kernel debug image for version 2.6.24 on x86
 linux-kernel-devel - Linux kernel hacking dependencies
 linux-libc-dev - Linux Kernel Headers for development
 linux-source-2.6.24 - Linux kernel source for version 2.6.24 with Ubuntu patches
Launchpad-Bugs-Fixed: 485556
Changes: 
 linux (2.6.24-28.70) hardy-security; urgency=low
 .
   [Stefan Bader]
 .
   * OPENVZ: Fix patch failure on fs/namei.c
     - CVE-2010-1088
   * KVM: x86: Completely backport get_cpl functionality
     - CVE-2010-0298
     - CVE-2010-0306
 .
   [Upstream Kernel Changes]
 .
   * virtio: finer-grained features for virtio_net
     - CVE-2010-0741
   * virtio: explicit advertisement of driver features
     - CVE-2010-0741
   * USB: usbfs: properly clean up the as structure on error paths
     - CVE-2010-1083
   * Bluetooth: Fix potential bad memory access with sysfs files
     - CVE-2010-1084
   * dvb-core: Fix DoS bug in ULE decapsulation code that can be triggered
     by an invalid Payload Pointer
     - CVE-2010-1086
   * ipv6: Fix OOPS in ip6_dst_lookup_tail().
     - CVE-2010-0437
   * GFS2: Skip check for mandatory locks when unlocking
     - CVE-2010-0727
   * tipc: Fix oops on send prior to entering networked mode (v3)
     - CVE-2010-1187
   * idr: fix a critical misallocation bug, take#2
     - LP: #485556
   * tty: release_one_tty() forgets to put pids
     - CVE-2010-1162
   * fix LOOKUP_FOLLOW on automount "symlinks"
     - CVE-2010-1088
   * NFS: Fix an Oops when truncating a file
     - CVE-2010-1087
   * r8169: Fix receive buffer length when MTU is between 1515 and 1536
     - CVE-2009-4537
   * r8169: offical fix for CVE-2009-4537 (overlength frame DMAs)
     - CVE-2009-4537
   * KVM: introduce kvm_read_guest_virt, kvm_write_guest_virt
     - CVE-2010-0298
     - CVE-2010-0306
   * KVM: remove the vmap usage
     - CVE-2010-0298
     - CVE-2010-0306
   * KVM: x86 emulator: Check CPL level during privilege instruction
     emulation
     - CVE-2010-0298
     - CVE-2010-0306
   * KVM: x86 emulator: Add Virtual-8086 mode of emulation
     - CVE-2010-0298
     - CVE-2010-0306
   * KVM: x86 emulator: fix memory access during x86 emulation
     - CVE-2010-0298
     - CVE-2010-0306
   * KVM: x86 emulator: Check IOPL level during io instruction emulation
     - CVE-2010-0298
     - CVE-2010-0306
   * KVM: VMX: Use macros instead of hex value on cr0 initialization
     - CVE-2010-0298
     - CVE-2010-0306
   * KVM: SVM: Reset cr0 properly on vcpu reset
     - CVE-2010-0298
     - CVE-2010-0306
Files: 
 f1f1a3629c40ac86e1b6172f2f3966cc 2258 devel optional linux_2.6.24-28.70.dsc
 c1da8b33fcf63ededcc7ab2498e4c964 4813262 devel optional linux_2.6.24-28.70.diff.gz


More information about the Hardy-changes mailing list