[ubuntu/karmic-security] linux (delayed), linux 2.6.31-22.60 (Accepted)
Ubuntu Installer
archive at ubuntu.com
Thu Jun 3 01:05:51 BST 2010
linux (2.6.31-22.60) karmic-security; urgency=low
[ Leann Ogasawara ]
* kvm: restrict writing of segment selectors to segment registers
- CVE-2010-0419
[ Upstream Kernel Changes ]
* USB: usbfs: properly clean up the as structure on error paths
- CVE-2010-1083
* Bluetooth: Fix potential bad memory access with sysfs files
- CVE-2010-1084
* ALSA: hda-intel: Avoid divide by zero crash
- CVE-2010-1085
* dvb-core: Fix DoS bug in ULE decapsulation code that can be triggered
by an invalid Payload Pointer
- CVE-2010-1086
* GFS2: Skip check for mandatory locks when unlocking
- CVE-2010-0727
* tipc: Fix oops on send prior to entering networked mode (v3)
- CVE-2010-1187
* inotify: do not reuse watch descriptors
- LP: #485556
* idr: fix a critical misallocation bug, take#2
- LP: #485556
* tty: release_one_tty() forgets to put pids
- CVE-2010-1162
* reiserfs: fix permissions on .reiserfs_priv
- CVE-2010-1146
* fix LOOKUP_FOLLOW on automount "symlinks"
- CVE-2010-1088
* NFS: Fix an Oops when truncating a file
- CVE-2010-1087
* Attempt #2 to handle null nameidata
- CVE-2010-1148
* r8169: Fix receive buffer length when MTU is between 1515 and 1536
- CVE-2009-4537
* r8169: offical fix for CVE-2009-4537 (overlength frame DMAs)
- CVE-2009-4537
* KVM: Use kvm_{read,write}_guest_virt() to read and write segment
descriptors
- CVE-2010-0298
- CVE-2010-0306
* KVM: x86 emulator: Check CPL level during privilege instruction
emulation
- CVE-2010-0298
- CVE-2010-0306
* KVM: x86 emulator: Add Virtual-8086 mode of emulation
- CVE-2010-0298
- CVE-2010-0306
* KVM: x86 emulator: fix memory access during x86 emulation
- CVE-2010-0298
- CVE-2010-0306
* KVM: x86 emulator: Check IOPL level during io instruction emulation
- CVE-2010-0298
- CVE-2010-0306
* KVM: x86 emulator: Fix popf emulation
- CVE-2010-0298
- CVE-2010-0306
* KVM: VMX: Use macros instead of hex value on cr0 initialization
- CVE-2010-0298
- CVE-2010-0306
* KVM: SVM: Reset cr0 properly on vcpu reset
- CVE-2010-0298
- CVE-2010-0306
* KVM: x86: disable paravirt mmu reporting
- CVE-2010-0298
- CVE-2010-0306
Date: Tue, 25 May 2010 14:01:30 +0200
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Maintainer: Ubuntu Kernel Team <kernel-team at lists.ubuntu.com>
https://launchpad.net/ubuntu/karmic/+source/linux/2.6.31-22.60
-------------- next part --------------
Format: 1.8
Date: Tue, 25 May 2010 14:01:30 +0200
Source: linux
Binary: linux-source-2.6.31 linux-doc linux-headers-2.6.31-22 linux-libc-dev linux-image-2.6.31-22-386 linux-headers-2.6.31-22-386 linux-image-debug-2.6.31-22-386 linux-image-2.6.31-22-generic linux-headers-2.6.31-22-generic linux-image-debug-2.6.31-22-generic linux-image-2.6.31-22-generic-pae linux-headers-2.6.31-22-generic-pae linux-image-debug-2.6.31-22-generic-pae linux-image-2.6.31-22-ia64 linux-headers-2.6.31-22-ia64 linux-image-debug-2.6.31-22-ia64 linux-image-2.6.31-22-lpia linux-headers-2.6.31-22-lpia linux-image-debug-2.6.31-22-lpia linux-image-2.6.31-22-powerpc linux-headers-2.6.31-22-powerpc linux-image-debug-2.6.31-22-powerpc linux-image-2.6.31-22-powerpc-smp linux-headers-2.6.31-22-powerpc-smp linux-image-debug-2.6.31-22-powerpc-smp linux-image-2.6.31-22-powerpc64-smp linux-headers-2.6.31-22-powerpc64-smp linux-image-debug-2.6.31-22-powerpc64-smp linux-image-2.6.31-22-server linux-headers-2.6.31-22-server linux-image-debug-2.6.31-22-server linux-image-2.6.31-22-sparc64
linux-headers-2.6.31-22-sparc64 linux-image-debug-2.6.31-22-sparc64 linux-image-2.6.31-22-sparc64-smp linux-headers-2.6.31-22-sparc64-smp linux-image-debug-2.6.31-22-sparc64-smp linux-image-2.6.31-22-virtual kernel-image-2.6.31-22-generic-di nic-modules-2.6.31-22-generic-di nic-shared-modules-2.6.31-22-generic-di serial-modules-2.6.31-22-generic-di ppp-modules-2.6.31-22-generic-di firewire-core-modules-2.6.31-22-generic-di scsi-modules-2.6.31-22-generic-di plip-modules-2.6.31-22-generic-di floppy-modules-2.6.31-22-generic-di fat-modules-2.6.31-22-generic-di nfs-modules-2.6.31-22-generic-di md-modules-2.6.31-22-generic-di usb-modules-2.6.31-22-generic-di pcmcia-storage-modules-2.6.31-22-generic-di fb-modules-2.6.31-22-generic-di input-modules-2.6.31-22-generic-di mouse-modules-2.6.31-22-generic-di irda-modules-2.6.31-22-generic-di parport-modules-2.6.31-22-generic-di nic-pcmcia-modules-2.6.31-22-generic-di pcmcia-modules-2.6.31-22-generic-di nic-usb-modules-2.6.31-22-generic-di
sata-modules-2.6.31-22-generic-di crypto-modules-2.6.31-22-generic-di char-modules-2.6.31-22-generic-di fs-core-modules-2.6.31-22-generic-di fs-secondary-modules-2.6.31-22-generic-di pata-modules-2.6.31-22-generic-di storage-core-modules-2.6.31-22-generic-di block-modules-2.6.31-22-generic-di message-modules-2.6.31-22-generic-di virtio-modules-2.6.31-22-generic-di
Architecture: source
Version: 2.6.31-22.60
Distribution: karmic-security
Urgency: low
Maintainer: Ubuntu Kernel Team <kernel-team at lists.ubuntu.com>
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Description:
block-modules-2.6.31-22-generic-di - Block storage devices (udeb)
char-modules-2.6.31-22-generic-di - Character module support (udeb)
crypto-modules-2.6.31-22-generic-di - crypto modules (udeb)
fat-modules-2.6.31-22-generic-di - FAT filesystem support (udeb)
fb-modules-2.6.31-22-generic-di - Framebuffer modules (udeb)
firewire-core-modules-2.6.31-22-generic-di - Firewire (IEEE-1394) Support (udeb)
floppy-modules-2.6.31-22-generic-di - Floppy driver support (udeb)
fs-core-modules-2.6.31-22-generic-di - Base filesystem modules (udeb)
fs-secondary-modules-2.6.31-22-generic-di - Extra filesystem modules (udeb)
input-modules-2.6.31-22-generic-di - Support for various input methods (udeb)
irda-modules-2.6.31-22-generic-di - Support for Infrared protocols (udeb)
kernel-image-2.6.31-22-generic-di - Linux kernel binary image for the Debian installer (udeb)
linux-doc - Linux kernel specific documentation for version 2.6.31
linux-headers-2.6.31-22 - Header files related to Linux kernel version 2.6.31
linux-headers-2.6.31-22-386 - Linux kernel headers for version 2.6.31 on i386
linux-headers-2.6.31-22-generic - Linux kernel headers for version 2.6.31 on x86/x86_64
linux-headers-2.6.31-22-generic-pae - Linux kernel headers for version 2.6.31 on x86
linux-headers-2.6.31-22-ia64 - Linux kernel headers for version 2.6.31 on IA-64 SMP
linux-headers-2.6.31-22-lpia - Linux kernel headers for version 2.6.31 on Intel Atom processors
linux-headers-2.6.31-22-powerpc - Linux kernel headers for version 2.6.31 on 32-bit PowerPC
linux-headers-2.6.31-22-powerpc-smp - Linux kernel headers for version 2.6.31 on 32-bit PowerPC SMP
linux-headers-2.6.31-22-powerpc64-smp - Linux kernel headers for version 2.6.31 on 64-bit PowerPC SMP
linux-headers-2.6.31-22-server - Linux kernel headers for version 2.6.31 on x86_64
linux-headers-2.6.31-22-sparc64 - Linux kernel headers for version 2.6.31 on 64-bit UltraSPARC
linux-headers-2.6.31-22-sparc64-smp - Linux kernel headers for version 2.6.31 on 64-bit UltraSPARC SMP
linux-image-2.6.31-22-386 - Linux kernel image for version 2.6.31 on i386
linux-image-2.6.31-22-generic - Linux kernel image for version 2.6.31 on x86/x86_64
linux-image-2.6.31-22-generic-pae - Linux kernel image for version 2.6.31 on x86
linux-image-2.6.31-22-ia64 - Linux kernel image for version 2.6.31 on IA-64 SMP
linux-image-2.6.31-22-lpia - Linux kernel image for version 2.6.31 on Intel Atom processors
linux-image-2.6.31-22-powerpc - Linux kernel image for version 2.6.31 on 32-bit PowerPC
linux-image-2.6.31-22-powerpc-smp - Linux kernel image for version 2.6.31 on 32-bit PowerPC SMP
linux-image-2.6.31-22-powerpc64-smp - Linux kernel image for version 2.6.31 on 64-bit PowerPC SMP
linux-image-2.6.31-22-server - Linux kernel image for version 2.6.31 on x86_64
linux-image-2.6.31-22-sparc64 - Linux kernel image for version 2.6.31 on 64-bit UltraSPARC
linux-image-2.6.31-22-sparc64-smp - Linux kernel image for version 2.6.31 on 64-bit UltraSPARC SMP
linux-image-2.6.31-22-virtual - Linux kernel image for version 2.6.31 on x86/x86_64
linux-image-debug-2.6.31-22-386 - Linux kernel debug image for version 2.6.31 on i386
linux-image-debug-2.6.31-22-generic - Linux kernel debug image for version 2.6.31 on x86/x86_64
linux-image-debug-2.6.31-22-generic-pae - Linux kernel debug image for version 2.6.31 on x86
linux-image-debug-2.6.31-22-ia64 - Linux kernel debug image for version 2.6.31 on IA-64 SMP
linux-image-debug-2.6.31-22-lpia - Linux kernel debug image for version 2.6.31 on Intel Atom process
linux-image-debug-2.6.31-22-powerpc - Linux kernel debug image for version 2.6.31 on 32-bit PowerPC
linux-image-debug-2.6.31-22-powerpc-smp - Linux kernel debug image for version 2.6.31 on 32-bit PowerPC SMP
linux-image-debug-2.6.31-22-powerpc64-smp - Linux kernel debug image for version 2.6.31 on 64-bit PowerPC SMP
linux-image-debug-2.6.31-22-server - Linux kernel debug image for version 2.6.31 on x86_64
linux-image-debug-2.6.31-22-sparc64 - Linux kernel debug image for version 2.6.31 on 64-bit UltraSPARC
linux-image-debug-2.6.31-22-sparc64-smp - Linux kernel debug image for version 2.6.31 on 64-bit UltraSPARC
linux-libc-dev - Linux Kernel Headers for development
linux-source-2.6.31 - Linux kernel source for version 2.6.31 with Ubuntu patches
md-modules-2.6.31-22-generic-di - Multi-device support (raid, device-mapper, lvm) (udeb)
message-modules-2.6.31-22-generic-di - Fusion and i2o storage modules (udeb)
mouse-modules-2.6.31-22-generic-di - Mouse support (udeb)
nfs-modules-2.6.31-22-generic-di - NFS filesystem drivers (udeb)
nic-modules-2.6.31-22-generic-di - Network interface support (udeb)
nic-pcmcia-modules-2.6.31-22-generic-di - PCMCIA network interface support (udeb)
nic-shared-modules-2.6.31-22-generic-di - nic shared modules (udeb)
nic-usb-modules-2.6.31-22-generic-di - USB network interface support (udeb)
parport-modules-2.6.31-22-generic-di - Parallel port support (udeb)
pata-modules-2.6.31-22-generic-di - PATA support modules (udeb)
pcmcia-modules-2.6.31-22-generic-di - PCMCIA Modules (udeb)
pcmcia-storage-modules-2.6.31-22-generic-di - PCMCIA storage support (udeb)
plip-modules-2.6.31-22-generic-di - PLIP (parallel port) networking support (udeb)
ppp-modules-2.6.31-22-generic-di - PPP (serial port) networking support (udeb)
sata-modules-2.6.31-22-generic-di - SATA storage support (udeb)
scsi-modules-2.6.31-22-generic-di - SCSI storage support (udeb)
serial-modules-2.6.31-22-generic-di - Serial port support (udeb)
storage-core-modules-2.6.31-22-generic-di - Core storage support (udeb)
usb-modules-2.6.31-22-generic-di - Core USB support (udeb)
virtio-modules-2.6.31-22-generic-di - VirtIO Modules (udeb)
Changes:
linux (2.6.31-22.60) karmic-security; urgency=low
.
[ Leann Ogasawara ]
.
* kvm: restrict writing of segment selectors to segment registers
- CVE-2010-0419
.
[ Upstream Kernel Changes ]
.
* USB: usbfs: properly clean up the as structure on error paths
- CVE-2010-1083
* Bluetooth: Fix potential bad memory access with sysfs files
- CVE-2010-1084
* ALSA: hda-intel: Avoid divide by zero crash
- CVE-2010-1085
* dvb-core: Fix DoS bug in ULE decapsulation code that can be triggered
by an invalid Payload Pointer
- CVE-2010-1086
* GFS2: Skip check for mandatory locks when unlocking
- CVE-2010-0727
* tipc: Fix oops on send prior to entering networked mode (v3)
- CVE-2010-1187
* inotify: do not reuse watch descriptors
- LP: #485556
* idr: fix a critical misallocation bug, take#2
- LP: #485556
* tty: release_one_tty() forgets to put pids
- CVE-2010-1162
* reiserfs: fix permissions on .reiserfs_priv
- CVE-2010-1146
* fix LOOKUP_FOLLOW on automount "symlinks"
- CVE-2010-1088
* NFS: Fix an Oops when truncating a file
- CVE-2010-1087
* Attempt #2 to handle null nameidata
- CVE-2010-1148
* r8169: Fix receive buffer length when MTU is between 1515 and 1536
- CVE-2009-4537
* r8169: offical fix for CVE-2009-4537 (overlength frame DMAs)
- CVE-2009-4537
* KVM: Use kvm_{read,write}_guest_virt() to read and write segment
descriptors
- CVE-2010-0298
- CVE-2010-0306
* KVM: x86 emulator: Check CPL level during privilege instruction
emulation
- CVE-2010-0298
- CVE-2010-0306
* KVM: x86 emulator: Add Virtual-8086 mode of emulation
- CVE-2010-0298
- CVE-2010-0306
* KVM: x86 emulator: fix memory access during x86 emulation
- CVE-2010-0298
- CVE-2010-0306
* KVM: x86 emulator: Check IOPL level during io instruction emulation
- CVE-2010-0298
- CVE-2010-0306
* KVM: x86 emulator: Fix popf emulation
- CVE-2010-0298
- CVE-2010-0306
* KVM: VMX: Use macros instead of hex value on cr0 initialization
- CVE-2010-0298
- CVE-2010-0306
* KVM: SVM: Reset cr0 properly on vcpu reset
- CVE-2010-0298
- CVE-2010-0306
* KVM: x86: disable paravirt mmu reporting
- CVE-2010-0298
- CVE-2010-0306
Checksums-Sha1:
f69ad40a82575bc4345839be707af7a422fb9bf8 3782 linux_2.6.31-22.60.dsc
ca5aa7ca3051a22bc2c3177810477f8114345252 2968144 linux_2.6.31-22.60.diff.gz
Checksums-Sha256:
eb7ebb00b02b459004e7fc395404b4356dd1a3ccbd971afdd7ebd795fbafeb87 3782 linux_2.6.31-22.60.dsc
5fb9d22acef5a581ed6cd1567573a906c0343d7b599796aa2865c87cadd0c63a 2968144 linux_2.6.31-22.60.diff.gz
Files:
1027672ce46ed3c00dd0fcc4682a64f9 3782 devel optional linux_2.6.31-22.60.dsc
51d9f41be632d0069d48b6fb7c53b059 2968144 devel optional linux_2.6.31-22.60.diff.gz
Launchpad-Bugs-Fixed: 485556 485556
More information about the Karmic-changes
mailing list