Ubuntu

“linux-qcm-msm” 2.6.31-802.4 source package in Ubuntu

Changelog

linux-qcm-msm (2.6.31-802.4) lucid-security; urgency=low

  [ Stefan Bader ]

  * Rebase to 2.6.31-22.60

  [ Ubuntu: 2.6.31-22.60 ]

  * kvm: restrict writing of segment selectors to segment registers
    - CVE-2010-0419
  * USB: usbfs: properly clean up the as structure on error paths
    - CVE-2010-1083
  * Bluetooth: Fix potential bad memory access with sysfs files
    - CVE-2010-1084
  * ALSA: hda-intel: Avoid divide by zero crash
    - CVE-2010-1085
  * dvb-core: Fix DoS bug in ULE decapsulation code that can be triggered
    by an invalid Payload Pointer
    - CVE-2010-1086
  * GFS2: Skip check for mandatory locks when unlocking
    - CVE-2010-0727
  * tipc: Fix oops on send prior to entering networked mode (v3)
    - CVE-2010-1187
  * inotify: do not reuse watch descriptors
    - LP: #485556
  * idr: fix a critical misallocation bug, take#2
    - LP: #485556
  * tty: release_one_tty() forgets to put pids
    - CVE-2010-1162
  * reiserfs: fix permissions on .reiserfs_priv
    - CVE-2010-1146
  * fix LOOKUP_FOLLOW on automount "symlinks"
    - CVE-2010-1088
  * NFS: Fix an Oops when truncating a file
    - CVE-2010-1087
  * Attempt #2 to handle null nameidata
    - CVE-2010-1148
  * r8169: Fix receive buffer length when MTU is between 1515 and 1536
    - CVE-2009-4537
  * r8169: offical fix for CVE-2009-4537 (overlength frame DMAs)
    - CVE-2009-4537
  * KVM: Use kvm_{read,write}_guest_virt() to read and write segment
    descriptors
    - CVE-2010-0298
    - CVE-2010-0306
  * KVM: x86 emulator: Check CPL level during privilege instruction
    emulation
    - CVE-2010-0298
    - CVE-2010-0306
  * KVM: x86 emulator: Add Virtual-8086 mode of emulation
    - CVE-2010-0298
    - CVE-2010-0306
  * KVM: x86 emulator: fix memory access during x86 emulation
    - CVE-2010-0298
    - CVE-2010-0306
  * KVM: x86 emulator: Check IOPL level during io instruction emulation
    - CVE-2010-0298
    - CVE-2010-0306
  * KVM: x86 emulator: Fix popf emulation
    - CVE-2010-0298
    - CVE-2010-0306
  * KVM: VMX: Use macros instead of hex value on cr0 initialization
    - CVE-2010-0298
    - CVE-2010-0306
  * KVM: SVM: Reset cr0 properly on vcpu reset
    - CVE-2010-0298
    - CVE-2010-0306
  * KVM: x86: disable paravirt mmu reporting
    - CVE-2010-0298
    - CVE-2010-0306
 -- Stefan Bader <email address hidden>   Tue, 25 May 2010 19:04:42 +0000

Upload details

Uploaded by:
Stefan Bader on 2010-06-01
Sponsored by:
Kees Cook
Uploaded to:
Lucid
Original maintainer:
Ubuntu Kernel Team
Component:
main
Architectures:
armel
Section:
devel
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Lucid security on 2010-06-03 main devel

Builds

Lucid: [FULLYBUILT] armel

Downloads

File Size MD5 Checksum
linux-qcm-msm_2.6.31.orig.tar.gz 74.7 MiB 16c0355d3612806ef87addf7c9f8c9f9
linux-qcm-msm_2.6.31-802.4.diff.gz 4.1 MiB 2e55ad3f665eba2ccfa99804c5f61941
linux-qcm-msm_2.6.31-802.4.dsc 2.1 KiB a0268c009b0452ce1d6bbfaba3ef0537

Binary packages built by this source

linux-headers-2.6.31-802-st1-5: Linux kernel headers for version 2.6.31 on ST1.5-based systems

 This package provides kernel header files for version 2.6.31 on
 ST1.5-based systems.
 .
 This is for sites that want the latest kernel headers. Please read
 /usr/share/doc/linux-headers-2.6.31-802/debian.README.gz for details.

linux-image-2.6.31-802-st1-5: Linux kernel image for version 2.6.31 on ST1.5-based systems

 This package contains the Linux kernel image for version 2.6.31 on
 ST1.5-based systems.
 .
 Also includes the corresponding System.map file, the modules built by the
 packager, and scripts that try to ensure that the system is not left in an
 unbootable state after an update.
 .
 Supports ST1.5 processors.
 .
 Qualcomm Snapdragon boards
 .
 You likely do not want to install this package directly. Instead, install
 the linux-st1-5 meta-package, which will ensure that upgrades work
 correctly, and that supporting packages are also installed.