[Bug 504164] Re: Random segfaults on amd64 (Hardy through Jaunty)
Launchpad Bug Tracker
504164 at bugs.launchpad.net
Tue Mar 16 23:09:36 UTC 2010
This bug was fixed in the package linux - 2.6.24-27.68
---------------
linux (2.6.24-27.68) hardy-security; urgency=low
[Stefan Bader]
* xen: Remove TIF_ABI_PENDING bit
- CVE-2010-0307
* openvz: Remove TIF_ABI_PENDING bit
- CVE-2010-0307
* openvz: Adapt connector code patch
- CVE-2010-0410
* rt: Remove TIF_ABI_PENDING bit
- CVE-2010-0307
[Surbhi Palande]
* Revert "[Upstream] e1000: enhance frame fragment detection"
- CVE-2009-4536
* Revert "[Upstream] e1000e: enhance frame fragment detection"
- CVE-2009-4538
[Upstream Kernel Changes]
* e1000: enhance frame fragment detection
- CVE-2009-4536
* e1000/e1000e: don't use small hardware rx buffers
- CVE-2009-4536
* e1000e: enhance frame fragment detection
- CVE-2009-4538
* connector: Delete buggy notification code.
- CVE-2010-0410
* Fix potential crash with sys_move_pages
- CVE-2010-0415
* futex: Handle user space corruption gracefully
- CVE-2010-0622
* x86: Increase MIN_GAP to include randomized stack
- LP: #504164
* Split 'flush_old_exec' into two functions
- CVE-2010-0307
* Fix 'flush_old_exec()/setup_new_exec()' split
- CVE-2010-0307
* x86: get rid of the insane TIF_ABI_PENDING bit
- CVE-2010-0307
* powerpc: TIF_ABI_PENDING bit removal
- CVE-2010-0307
* sparc: TIF_ABI_PENDING bit removal
- CVE-2010-0307
* x86: set_personality_ia32() misses force_personality32
- CVE-2010-0307
-- Stefan Bader <stefan.bader at canonical.com> Tue, 09 Mar 2010 22:21:39 +0100
--
Random segfaults on amd64 (Hardy through Jaunty)
https://bugs.launchpad.net/bugs/504164
You received this bug notification because you are a member of Kernel
Bugs, which is subscribed to linux in ubuntu.
More information about the kernel-bugs
mailing list