This bug was fixed in the package linux-ti-omap4 - 2.6.38-1209.18
--------------- linux-ti-omap4 (2.6.38-1209.18) natty-proposed; urgency=low
* Release Tracking Bug - LP: #897566
[ Upstream Kernel Changes ]
* crypto: ghash - Avoid null pointer dereference if no key is set - LP: #887299 - CVE-2011-4081 * xfs: Fix possible memory corruption in xfs_readlink, CVE-2011-4077 - LP: #887298 - CVE-2011-4077 * jbd/jbd2: validate sb->s_first in journal_get_superblock() - LP: #893148 - CVE-2011-4132 * inetpeer: reduce stack usage, CVE-2011-4087 - LP: #887302 - CVE-2011-4087 * hfs: add sanity check for file name length, CVE-2011-4330 - LP: #894374 - CVE-2011-4330 * ipv6: udp: fix the wrong headroom check - LP: #894373 - CVE-2011-4326 -- Paolo Pisati <email address hidden> Fri, 02 Dec 2011 13:15:41 +0100
This bug was fixed in the package linux-ti-omap4 - 2.6.38-1209.18
---------------
linux-ti-omap4 (2.6.38-1209.18) natty-proposed; urgency=low
* Release Tracking Bug
- LP: #897566
[ Upstream Kernel Changes ]
* crypto: ghash - Avoid null pointer dereference if no key is set get_superblock( )
- LP: #887299
- CVE-2011-4081
* xfs: Fix possible memory corruption in xfs_readlink, CVE-2011-4077
- LP: #887298
- CVE-2011-4077
* jbd/jbd2: validate sb->s_first in journal_
- LP: #893148
- CVE-2011-4132
* inetpeer: reduce stack usage, CVE-2011-4087
- LP: #887302
- CVE-2011-4087
* hfs: add sanity check for file name length, CVE-2011-4330
- LP: #894374
- CVE-2011-4330
* ipv6: udp: fix the wrong headroom check
- LP: #894373
- CVE-2011-4326
-- Paolo Pisati <email address hidden> Fri, 02 Dec 2011 13:15:41 +0100