[Bug 224138] Re: NFSv4 not enabled in JeOS
Launchpad Bug Tracker
224138 at bugs.launchpad.net
Mon May 4 09:35:17 UTC 2009
This bug was fixed in the package linux - 2.6.24-24.53
---------------
linux (2.6.24-24.53) hardy-proposed; urgency=low
[Stefan Bader]
* Rebuild of 2.6.24-24.51 with 2.6.24-23.52 security patches applied.
linux (2.6.24-24.51) hardy-proposed; urgency=low
[Alessio Igor Bogani]
* rt: Updated PREEMPT_RT support to rt27
- LP: #324275
[Steve Beattie]
* fix apparmor memory leak on deleted file ops
- LP: #329489
[Upstream Kernel Changes]
* KVM: MMU: Add locking around kvm_mmu_slot_remove_write_access()
- LP: #335097, #333409
* serial: 8250: fix shared interrupts issues with SMP and RT kernels
- LP: #280821
* 8250.c: port.lock is irq-safe
- LP: #280821
* ACPI: Clear WAK_STS on resume
- LP: #251338
linux (2.6.24-24.50) hardy-proposed; urgency=low
[Alok Kataria]
* x86: add X86_FEATURE_HYPERVISOR feature bit
- LP: #319945
* x86: add a synthetic TSC_RELIABLE feature bit
- LP: #319945
* x86: vmware: look for DMI string in the product serial key
- LP: #319945
* x86: Hypervisor detection and get tsc_freq from hypervisor
- LP: #319945
* x86: Use the synthetic TSC_RELIABLE bit to workaround virtualization
anomalies.
- LP: #319945
* x86: Skip verification by the watchdog for TSC clocksource.
- LP: #319945
* x86: Mark TSC synchronized on VMware.
- LP: #319945
[Colin Ian King]
* SAUCE: Bluetooth USB: fix kernel panic during suspend while streaming
audio to bluetooth headset
- LP: #331106
[James Troup]
* XEN: Enable architecture specific get_unmapped_area_topdown
- LP: #237724
[Stefan Bader]
* Xen: Fix FTBS after Vmware TSC updates.
- LP: #319945
[Upstream Kernel Changes]
* r8169: fix RxMissed register access
- LP: #324760
* r8169: Tx performance tweak helper
- LP: #326891
* r8169: use pci_find_capability for the PCI-E features
- LP: #326891
* r8169: add 8168/8101 registers description
- LP: #326891
* r8169: add hw start helpers for the 8168 and the 8101
- LP: #326891
* r8169: additional 8101 and 8102 support
- LP: #326891
* Fix memory corruption in console selection
- LP: #329007
linux (2.6.24-23.52) hardy-security; urgency=low
[Stefan Bader]
* rt: Fix FTBS caused by shm changes
- CVE-2009-0859
[Steve Beattie]
* fix apparmor memory leak on deleted file ops
- LP: #329489
[Upstream Kernel Changes]
* NFS: Remove the buggy lock-if-signalled case from do_setlk()
- CVE-2008-4307
* sctp: Avoid memory overflow while FWD-TSN chunk is received with bad
stream ID
- CVE-2009-0065
* net: 4 bytes kernel memory disclosure in SO_BSDCOMPAT gsopt try #2
- CVE-2009-0676
* sparc: Fix mremap address range validation.
- CVE-2008-6107
* copy_process: fix CLONE_PARENT && parent_exec_id interaction
- CVE-2009-0028
* security: introduce missing kfree
- CVE-2009-0031
* eCryptfs: check readlink result was not an error before using it
- CVE-2009-0269
* dell_rbu: use scnprintf() instead of less secure sprintf()
- CVE-2009-0322
* drivers/net/skfp: if !capable(CAP_NET_ADMIN): inverted logic
- CVE-2009-0675
* Ext4: Fix online resize block group descriptor corruption
- CVE-2009-0745
* ext4: Initialize the new group descriptor when resizing the filesystem
- CVE-2009-0745
* ext4: Add sanity check to make_indexed_dir
- CVE-2009-0746
* x86-64: syscall-audit: fix 32/64 syscall hole
- CVE-2009-0834
* x86-64: seccomp: fix 32/64 syscall hole
- CVE-2009-0835
* shm: fix shmctl(SHM_INFO) lockup with !CONFIG_SHMEM
- CVE-2009-0859
* apparmor: Fix handling of larger number of profiles
- LP: #345144
* udf: Fix oops when invalid character in filename occurs
- LP: #321606
* Fix memory corruption in console selection
- CVE-2009-1046
* SPARC64: Loosen checks in exception table handling.
- LP: #301608, #349655
linux (2.6.24-23.49) hardy-proposed; urgency=low
[Colin Ian King]
* drm/i915 fixes to AR register restore
- LP: #302421
[Fabio M. Di Nitto]
* Enable USB serial support on sparc
- LP: #305188
[Stefan Bader]
* openvz: Adapt openvz patch to compile with improved tcp hash
- LP: #301608
* Ubuntu-2.6.24-23.47
* Merge of Ubuntu-2.6.24-23.48 security release
[Tim Gardner]
* Enable CONFIG_NFSD_V4=y in -virtual flavour.
- LP: #224138
[Upstream Kernel Changes]
* SPARC64: Loosen checks in exception table handling.
- LP: #301608
* SPARC: Fix link errors with gcc-4.3
- LP: #301608
* TCP: Improve ipv4 established hash function.
- LP: #301608
* NIU: More BMAC alt MAC address fixes.
- LP: #301608
* NIU: Fix BMAC alternate MAC address indexing.
- LP: #301608
* NIU: Bump driver version and release date.
- LP: #301608
[Zhao Yakui]
* Add "acpi.power_nocheck=1" to disable power state check in power
transition
- LP: #69925
* ACPI: Attach the ACPI device to the ACPI handle as early as possible
- LP: #69925
* ACPI: Add DMI check to disable power state check in power transition
- LP: #69925
-- Stefan Bader <stefan.bader at canonical.com> Sun, 05 Apr 2009
08:23:06 -0400
** Changed in: linux (Ubuntu Hardy)
Status: Fix Committed => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-4307
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-6107
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-0028
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-0031
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-0065
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-0269
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-0322
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-0675
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-0676
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-0745
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-0746
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-0834
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-0835
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-0859
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-1046
--
NFSv4 not enabled in JeOS
https://bugs.launchpad.net/bugs/224138
You received this bug notification because you are a member of Kernel
Bugs, which is subscribed to Linux.
More information about the kernel-bugs
mailing list