linux-qcm-msm 2.6.31-802.4 source package in Ubuntu

Changelog

linux-qcm-msm (2.6.31-802.4) lucid-security; urgency=low

  [ Stefan Bader ]

  * Rebase to 2.6.31-22.60

  [ Ubuntu: 2.6.31-22.60 ]

  * kvm: restrict writing of segment selectors to segment registers
    - CVE-2010-0419
  * USB: usbfs: properly clean up the as structure on error paths
    - CVE-2010-1083
  * Bluetooth: Fix potential bad memory access with sysfs files
    - CVE-2010-1084
  * ALSA: hda-intel: Avoid divide by zero crash
    - CVE-2010-1085
  * dvb-core: Fix DoS bug in ULE decapsulation code that can be triggered
    by an invalid Payload Pointer
    - CVE-2010-1086
  * GFS2: Skip check for mandatory locks when unlocking
    - CVE-2010-0727
  * tipc: Fix oops on send prior to entering networked mode (v3)
    - CVE-2010-1187
  * inotify: do not reuse watch descriptors
    - LP: #485556
  * idr: fix a critical misallocation bug, take#2
    - LP: #485556
  * tty: release_one_tty() forgets to put pids
    - CVE-2010-1162
  * reiserfs: fix permissions on .reiserfs_priv
    - CVE-2010-1146
  * fix LOOKUP_FOLLOW on automount "symlinks"
    - CVE-2010-1088
  * NFS: Fix an Oops when truncating a file
    - CVE-2010-1087
  * Attempt #2 to handle null nameidata
    - CVE-2010-1148
  * r8169: Fix receive buffer length when MTU is between 1515 and 1536
    - CVE-2009-4537
  * r8169: offical fix for CVE-2009-4537 (overlength frame DMAs)
    - CVE-2009-4537
  * KVM: Use kvm_{read,write}_guest_virt() to read and write segment
    descriptors
    - CVE-2010-0298
    - CVE-2010-0306
  * KVM: x86 emulator: Check CPL level during privilege instruction
    emulation
    - CVE-2010-0298
    - CVE-2010-0306
  * KVM: x86 emulator: Add Virtual-8086 mode of emulation
    - CVE-2010-0298
    - CVE-2010-0306
  * KVM: x86 emulator: fix memory access during x86 emulation
    - CVE-2010-0298
    - CVE-2010-0306
  * KVM: x86 emulator: Check IOPL level during io instruction emulation
    - CVE-2010-0298
    - CVE-2010-0306
  * KVM: x86 emulator: Fix popf emulation
    - CVE-2010-0298
    - CVE-2010-0306
  * KVM: VMX: Use macros instead of hex value on cr0 initialization
    - CVE-2010-0298
    - CVE-2010-0306
  * KVM: SVM: Reset cr0 properly on vcpu reset
    - CVE-2010-0298
    - CVE-2010-0306
  * KVM: x86: disable paravirt mmu reporting
    - CVE-2010-0298
    - CVE-2010-0306
 -- Stefan Bader <email address hidden>   Tue, 25 May 2010 19:04:42 +0000

Upload details

Uploaded by:
Stefan Bader on 2010-06-01
Sponsored by:
Kees Cook
Uploaded to:
Lucid
Original maintainer:
Ubuntu Kernel Team
Architectures:
armel
Section:
devel
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Lucid security on 2010-06-03 main devel

Builds

Lucid: [FULLYBUILT] armel

Downloads

File Size SHA-256 Checksum
linux-qcm-msm_2.6.31.orig.tar.gz 74.7 MiB 304eab47177ecd6964b587df1682c31d21e4c4bc2e6ebfa14218c85a76659bc7
linux-qcm-msm_2.6.31-802.4.diff.gz 4.1 MiB c3c27e707921b3f062ba309090ee99ecd19249832744a16e94dc896cc8f3e648
linux-qcm-msm_2.6.31-802.4.dsc 2.1 KiB 2d981a832445587e9c5b303097d1bed66c7703973b83b8ea69e1ff3bd69f1717

View changes file

Binary packages built by this source

linux-headers-2.6.31-802-st1-5: Linux kernel headers for version 2.6.31 on ST1.5-based systems

 This package provides kernel header files for version 2.6.31 on
 ST1.5-based systems.
 .
 This is for sites that want the latest kernel headers. Please read
 /usr/share/doc/linux-headers-2.6.31-802/debian.README.gz for details.

linux-image-2.6.31-802-st1-5: Linux kernel image for version 2.6.31 on ST1.5-based systems

 This package contains the Linux kernel image for version 2.6.31 on
 ST1.5-based systems.
 .
 Also includes the corresponding System.map file, the modules built by the
 packager, and scripts that try to ensure that the system is not left in an
 unbootable state after an update.
 .
 Supports ST1.5 processors.
 .
 Qualcomm Snapdragon boards
 .
 You likely do not want to install this package directly. Instead, install
 the linux-st1-5 meta-package, which will ensure that upgrades work
 correctly, and that supporting packages are also installed.