[Bug 504164] Re: Random segfaults on amd64 (Hardy through Jaunty)
Launchpad Bug Tracker
504164 at bugs.launchpad.net
Tue Mar 16 23:09:36 UTC 2010
This bug was fixed in the package linux - 2.6.27-17.46
---------------
linux (2.6.27-17.46) intrepid-security; urgency=low
[ Surbhi Palande ]
* Revert "[Upstream] e1000: enhance frame fragment detection"
- CVE-2009-4536
* Revert "[Upstream] e1000e: enhance frame fragment detection"
- CVE-2009-4538
[ Upstream Kernel Changes ]
* e1000: enhance frame fragment detection
- CVE-2009-4536
* e1000/e1000e: don't use small hardware rx buffers
- CVE-2009-4538
* e1000e: enhance frame fragment detection
- CVE-2009-4538
* KVM: PIT: control word is write-only
- CVE-2010-0309
* connector: Delete buggy notification code.
- CVE-2010-0410
* Fix potential crash with sys_move_pages
- CVE-2010-0415
* futex: Handle user space corruption gracefully
- CVE-2010-0622
* x86: Increase MIN_GAP to include randomized stack
- LP: #504164
* Split 'flush_old_exec' into two functions
- CVE-2010-0307
* Fix 'flush_old_exec()/setup_new_exec()' split
- CVE-2010-0307
* x86: get rid of the insane TIF_ABI_PENDING bit
- CVE-2010-0307
* powerpc: TIF_ABI_PENDING bit removal
- CVE-2010-0307
* sparc: TIF_ABI_PENDING bit removal
- CVE-2010-0307
* x86: set_personality_ia32() misses force_personality32
- CVE-2010-0307
-- Stefan Bader <stefan.bader at canonical.com> Tue, 09 Mar 2010 20:46:15 +0100
** Changed in: linux (Ubuntu Hardy)
Status: In Progress => Fix Released
--
Random segfaults on amd64 (Hardy through Jaunty)
https://bugs.launchpad.net/bugs/504164
You received this bug notification because you are a member of Kernel
Bugs, which is subscribed to linux in ubuntu.
More information about the kernel-bugs
mailing list