This bug was fixed in the package linux - 2.6.28-14.47
--------------- linux (2.6.28-14.47) jaunty-security; urgency=low
[ Upstream Kernel Changes ]
* Add '-fno-delete-null-pointer-checks' to gcc CFLAGS - LP: #403647 * personality: fix PER_CLEAR_ON_SETID - CVE-2009-1895 * KVM: x86: check for cr3 validity in ioctl_set_sregs - CVE-2009-2287 * r8169: fix crash when large packets are received - CVE-2009-1389 * eCryptfs: Check Tag 11 literal data buffer size - CVE-2009-2406 * eCryptfs: parse_tag_3_packet check tag 3 packet encrypted key size - CVE-2009-2407
-- Stefan Bader <email address hidden> Thu, 23 Jul 2009 15:49:09 +0200
This bug was fixed in the package linux - 2.6.28-14.47
---------------
linux (2.6.28-14.47) jaunty-security; urgency=low
[ Upstream Kernel Changes ]
* Add '-fno-delete- null-pointer- checks' to gcc CFLAGS
- LP: #403647
* personality: fix PER_CLEAR_ON_SETID
- CVE-2009-1895
* KVM: x86: check for cr3 validity in ioctl_set_sregs
- CVE-2009-2287
* r8169: fix crash when large packets are received
- CVE-2009-1389
* eCryptfs: Check Tag 11 literal data buffer size
- CVE-2009-2406
* eCryptfs: parse_tag_3_packet check tag 3 packet encrypted key size
- CVE-2009-2407
-- Stefan Bader <email address hidden> Thu, 23 Jul 2009 15:49:09 +0200