[ubuntu/lucid-security] linux-ti-omap (delayed), linux-ti-omap 2.6.33-502.10 (Accepted)
Ubuntu Installer
archive at ubuntu.com
Thu Aug 19 21:03:31 BST 2010
linux-ti-omap (2.6.33-502.10) lucid-security; urgency=low
[ Upstream Kernel Changes ]
* drm: Initialize ioctl struct when no user data is present
- CVE-2010-2803
* can: add limit for nframes and clean up signed/unsigned variables
- CVE-2010-2959
* mm: keep a guard page below a grow-down stack segment
- CVE-2010-2240
* mm: fix missing page table unmap for stack guard page failure case
- CVE-2010-2240
* mm: fix page table unmap for stack guard page properly
- CVE-2010-2240
* mm: fix up some user-visible effects of the stack guard page
- CVE-2010-2240
* x86: don't send SIGBUS for kernel page faults
- CVE-2010-2240
Date: Wed, 18 Aug 2010 15:50:33 +0200
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Maintainer: Ubuntu Kernel Team <kernel-team at lists.ubuntu.com>
https://launchpad.net/ubuntu/lucid/+source/linux-ti-omap/2.6.33-502.10
-------------- next part --------------
Format: 1.8
Date: Wed, 18 Aug 2010 15:50:33 +0200
Source: linux-ti-omap
Binary: linux-headers-2.6.33-502 linux-image-2.6.33-502-omap linux-headers-2.6.33-502-omap linux-image-2.6.33-502-omap-dbgsym
Architecture: source
Version: 2.6.33-502.10
Distribution: lucid-security
Urgency: low
Maintainer: Ubuntu Kernel Team <kernel-team at lists.ubuntu.com>
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Description:
linux-headers-2.6.33-502 - Header files related to linux-ti-omap kernel version 2.6.33
linux-headers-2.6.33-502-omap - Linux kernel headers for version 2.6.33 on OMAP3-based systems
linux-image-2.6.33-502-omap - Linux kernel image for version 2.6.33 on OMAP3-based systems
linux-image-2.6.33-502-omap-dbgsym - Linux kernel debug image for version 2.6.33 on OMAP3-based system
Changes:
linux-ti-omap (2.6.33-502.10) lucid-security; urgency=low
.
[ Upstream Kernel Changes ]
.
* drm: Initialize ioctl struct when no user data is present
- CVE-2010-2803
* can: add limit for nframes and clean up signed/unsigned variables
- CVE-2010-2959
* mm: keep a guard page below a grow-down stack segment
- CVE-2010-2240
* mm: fix missing page table unmap for stack guard page failure case
- CVE-2010-2240
* mm: fix page table unmap for stack guard page properly
- CVE-2010-2240
* mm: fix up some user-visible effects of the stack guard page
- CVE-2010-2240
* x86: don't send SIGBUS for kernel page faults
- CVE-2010-2240
Checksums-Sha1:
413cf0ed5c6300b3ce4cc99dfb3ad86a02708298 1408 linux-ti-omap_2.6.33-502.10.dsc
940244a3fbcfb7b9b7c9d4db7f8e8dd4f7876243 3442637 linux-ti-omap_2.6.33-502.10.diff.gz
Checksums-Sha256:
e78e462fe20d77c53332f96ed61695607cf1c4005d3a8275c4a60b75ca3ae8cf 1408 linux-ti-omap_2.6.33-502.10.dsc
4c3488066878139db565b8aaa35bf54caf4b8f7cb4335f81525ed0fd82756891 3442637 linux-ti-omap_2.6.33-502.10.diff.gz
Files:
715ad2bccd28a85c56006ed613e59b27 1408 devel optional linux-ti-omap_2.6.33-502.10.dsc
0ef8b9d727514a85d33f868abf2cc9ee 3442637 devel optional linux-ti-omap_2.6.33-502.10.diff.gz
More information about the Lucid-changes
mailing list