Format: 1.8 Date: Mon, 18 Oct 2010 10:01:36 +0200 Source: linux-ec2 Binary: linux-ec2-source-2.6.32 linux-ec2-doc linux-headers-2.6.32-309 linux-image-2.6.32-309-ec2 linux-headers-2.6.32-309-ec2 linux-image-2.6.32-309-ec2-dbgsym Architecture: amd64 Version: 2.6.32-309.18 Distribution: lucid Urgency: low Maintainer: Ubuntu/amd64 Build Daemon Changed-By: Stefan Bader Description: linux-ec2-doc - Linux kernel specific documentation for version 2.6.32 linux-ec2-source-2.6.32 - Linux kernel source for version 2.6.32 with Ubuntu patches linux-headers-2.6.32-309 - Header files related to Linux kernel version 2.6.32 linux-headers-2.6.32-309-ec2 - Linux kernel headers for version 2.6.32 on x86/x86_64 linux-image-2.6.32-309-ec2 - Linux kernel image for version 2.6.32 on x86/x86_64 linux-image-2.6.32-309-ec2-dbgsym - Linux kernel debug image for version 2.6.32 on x86/x86_64 Launchpad-Bugs-Fixed: 646114 Changes: linux-ec2 (2.6.32-309.18) lucid-security; urgency=low . [ Stefan Bader ] . * Rebased to 2.6.32-25.45 . [ Ubuntu: 2.6.32-25.45 ] . * v4l: disable dangerous buggy compat function - CVE-2010-2963 * Local privilege escalation vulnerability in RDS sockets - CVE-2010-3904 * mm: (pre-stable) Move vma_stack_continue into mm.h - LP: #646114 * net sched: fix some kernel memory leaks - CVE-2010-2942 * irda: Correctly clean up self->ias_obj on irda_bind() failure. - CVE-2010-2954 * wireless extensions: fix kernel heap content leak - CVE-2010-2955 * KEYS: Fix RCU no-lock warning in keyctl_session_to_parent() - CVE-2010-2960 * KEYS: Fix bug in keyctl_session_to_parent() if parent has no session keyring - CVE-2010-2960 * aio: check for multiplication overflow in do_io_submit - CVE-2010-3067 * xfs: prevent reading uninitialized stack memory - CVE-2010-3078 * ALSA: seq/oss - Fix double-free at error path of snd_seq_oss_open() - CVE-2010-3080 * niu: Fix kernel buffer overflow for ETHTOOL_GRXCLSRLALL - CVE-2010-3084 * rose: Fix signedness issues wrt. digi count. - CVE-2010-3310 * sctp: Do not reset the packet during sctp_packet_config(). - CVE-2010-3432 * Fix pktcdvd ioctl dev_minor range check - CVE-2010-3437 * ALSA: prevent heap corruption in snd_ctl_new() - CVE-2010-3442 * net sched: fix kernel leak in act_police - CVE-2010-3477 * Fix out-of-bounds reading in sctp_asoc_get_hmac() - CVE-2010-3705 * ocfs2: Don't walk off the end of fast symlinks. - CVE-2010-NNN2 Checksums-Sha1: 9116550dbbcd288d462dbc6fba8a26d177f31686 19842508 linux-image-2.6.32-309-ec2_2.6.32-309.18_amd64.deb 5d7bedc889d0fe2780e411932754bcd6dd5aa7a9 668654 linux-headers-2.6.32-309-ec2_2.6.32-309.18_amd64.deb Checksums-Sha256: 5ed0947a3d79fb748e71ba803ba13ed63620c52bab1a613b32eb6572bf3d36c1 19842508 linux-image-2.6.32-309-ec2_2.6.32-309.18_amd64.deb ddb76b750d2441a51faaa2cf58b5be6719781ed09e34083e1953d568a0bec781 668654 linux-headers-2.6.32-309-ec2_2.6.32-309.18_amd64.deb Files: 98c985cec989651e433e92c7f0d05a3a 19842508 admin optional linux-image-2.6.32-309-ec2_2.6.32-309.18_amd64.deb 7ec68aae2d04ee6fa09a7f29c94950d2 668654 devel optional linux-headers-2.6.32-309-ec2_2.6.32-309.18_amd64.deb