Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

USN-1119-1: Linux kernel (OMAP4) vulnerabilities

20 April 2011

Multiple security flaws have been fixed in the OMAP4 port of the Linux kernel.

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.

Learn more about Ubuntu Pro

Releases

Packages

Details

Dan Rosenberg discovered that the RDS network protocol did not correctly
check certain parameters. A local attacker could exploit this gain root
privileges. (CVE-2010-3904)

Nelson Elhage discovered several problems with the Acorn Econet protocol
driver. A local user could cause a denial of service via a NULL pointer
dereference, escalate privileges by overflowing the kernel stack, and
assign Econet addresses to arbitrary interfaces. (CVE-2010-3848,
CVE-2010-3849, CVE-2010-3850)

Ben Hawkes discovered that the Linux kernel did not correctly validate
memory ranges on 64bit kernels when allocating memory on behalf of 32bit
system calls. On a 64bit system, a local attacker could perform malicious
multicast getsockopt calls to gain root privileges. (CVE-2010-3081)

Tavis Ormandy discovered that the IRDA subsystem did not correctly shut
down. A local attacker could exploit this to cause the system to crash or
possibly gain root privileges. (CVE-2010-2954)

Brad Spengler discovered that the wireless extensions did not correctly
validate certain request sizes. A local attacker could exploit this to read
portions of kernel memory, leading to a loss of privacy. (CVE-2010-2955)

Tavis Ormandy discovered that the session keyring did not correctly check
for its parent. On systems without a default session keyring, a local
attacker could exploit this to crash the system, leading to a denial of
service. (CVE-2010-2960)

Kees Cook discovered that the Intel i915 graphics driver did not correctly
validate memory regions. A local attacker with access to the video card
could read and write arbitrary kernel memory to gain root privileges.
(CVE-2010-2962)

Kees Cook discovered that the V4L1 32bit compat interface did not correctly
validate certain parameters. A local attacker on a 64bit system with access
to a video device could exploit this to gain root privileges.
(CVE-2010-2963)

Robert Swiecki discovered that ftrace did not correctly handle mutexes. A
local attacker could exploit this to crash the kernel, leading to a denial
of service. (CVE-2010-3079)

Tavis Ormandy discovered that the OSS sequencer device did not correctly
shut down. A local attacker could exploit this to crash the system or
possibly gain root privileges. (CVE-2010-3080)

Dan Rosenberg discovered that the CD driver did not correctly check
parameters. A local attacker could exploit this to read arbitrary kernel
memory, leading to a loss of privacy. (CVE-2010-3437)

Dan Rosenberg discovered that SCTP did not correctly handle HMAC
calculations. A remote attacker could send specially crafted traffic that
would crash the system, leading to a denial of service. (CVE-2010-3705)

Kees Cook discovered that the ethtool interface did not correctly clear
kernel memory. A local attacker could read kernel heap memory, leading to a
loss of privacy. (CVE-2010-3861)

Thomas Pollet discovered that the RDS network protocol did not check
certain iovec buffers. A local attacker could exploit this to crash the
system or possibly execute arbitrary code as the root user. (CVE-2010-3865)

Vasiliy Kulikov discovered that the Linux kernel X.25 implementation did
not correctly clear kernel memory. A local attacker could exploit this to
read kernel stack memory, leading to a loss of privacy. (CVE-2010-3875)

Vasiliy Kulikov discovered that the Linux kernel sockets implementation did
not properly initialize certain structures. A local attacker could exploit
this to read kernel stack memory, leading to a loss of privacy.
(CVE-2010-3876)

Vasiliy Kulikov discovered that the TIPC interface did not correctly
initialize certain structures. A local attacker could exploit this to read
kernel stack memory, leading to a loss of privacy. (CVE-2010-3877)

Vasiliy Kulikov discovered that kvm did not correctly clear memory. A local
attacker could exploit this to read portions of the kernel stack, leading
to a loss of privacy. (CVE-2010-3881)

Kees Cook and Vasiliy Kulikov discovered that the shm interface did not
clear kernel memory correctly. A local attacker could exploit this to read
kernel stack memory, leading to a loss of privacy. (CVE-2010-4072)

Dan Rosenberg discovered that the ivtv V4L driver did not correctly
initialize certian structures. A local attacker could exploit this to read
kernel stack memory, leading to a loss of privacy. (CVE-2010-4079)

Dan Rosenberg discovered that the socket filters did not correctly
initialize structure memory. A local attacker could create malicious
filters to read portions of kernel stack memory, leading to a loss of
privacy. (CVE-2010-4158)

Dan Rosenberg discovered multiple flaws in the X.25 facilities parsing. If
a system was using X.25, a remote attacker could exploit this to crash the
system, leading to a denial of service. (CVE-2010-4164)

Steve Chen discovered that setsockopt did not correctly check MSS values. A
local attacker could make a specially crafted socket call to crash the
system, leading to a denial of service. (CVE-2010-4165)

Vegard Nossum discovered that memory garbage collection was not handled
correctly for active sockets. A local attacker could exploit this to
allocate all available kernel memory, leading to a denial of service.
(CVE-2010-4249)

Nelson Elhage discovered that the kernel did not correctly handle process
cleanup after triggering a recoverable kernel bug. If a local attacker were
able to trigger certain kinds of kernel bugs, they could create a specially
crafted process to gain root privileges. (CVE-2010-4258)

Nelson Elhage discovered that Econet did not correctly handle AUN packets
over UDP. A local attacker could send specially crafted traffic to crash
the system, leading to a denial of service. (CVE-2010-4342)

Tavis Ormandy discovered that the install_special_mapping function could
bypass the mmap_min_addr restriction. A local attacker could exploit this
to mmap 4096 bytes below the mmap_min_addr area, possibly improving the
chances of performing NULL pointer dereference attacks. (CVE-2010-4346)

Dan Rosenberg discovered that the OSS subsystem did not handle name
termination correctly. A local attacker could exploit this crash the system
or gain root privileges. (CVE-2010-4527)

Dan Rosenberg discovered that IRDA did not correctly check the size of
buffers. On non-x86 systems, a local attacker could exploit this to read
kernel heap memory, leading to a loss of privacy. (CVE-2010-4529)

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.

Learn more about Ubuntu Pro

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 10.10

After a standard system update you need to reboot your computer to make
all the necessary changes.

Related notices

  • USN-1074-1: linux-image-2.6.31-112-imx51, linux-fsl-imx51
  • USN-1083-1: linux-image-2.6.35-25-virtual, linux-image-2.6.35-25-generic-pae, linux-lts-backport-maverick, linux-image-2.6.35-25-generic, linux-image-2.6.35-25-server
  • USN-1000-1: linux-image-2.6.32-25-virtual, linux-image-2.6.15-55-686, linux, linux-image-2.6.24-28-lpiacompat, linux-image-2.6.24-28-generic, linux-image-2.6.24-28-sparc64-smp, linux-image-2.6.28-19-virtual, linux-source-2.6.15, linux-image-2.6.32-25-preempt, linux-image-2.6.31-22-lpia, linux-image-2.6.15-55-amd64-generic, linux-image-2.6.32-25-sparc64, linux-image-2.6.15-55-mckinley, linux-image-2.6.24-28-lpia, linux-image-2.6.31-22-generic, linux-image-2.6.28-19-lpia, linux-image-2.6.35-22-powerpc64-smp, linux-image-2.6.32-25-generic, linux-image-2.6.15-55-powerpc64-smp, linux-image-2.6.31-22-sparc64, linux-image-2.6.28-19-generic, linux-image-2.6.24-28-powerpc, linux-image-2.6.31-22-virtual, linux-image-2.6.28-19-versatile, linux-image-2.6.35-22-generic-pae, linux-image-2.6.15-55-hppa32, linux-image-2.6.35-22-powerpc, linux-image-2.6.15-55-amd64-k8, linux-ec2, linux-image-2.6.32-25-ia64, linux-image-2.6.24-28-xen, linux-image-2.6.32-25-lpia, linux-image-2.6.31-22-powerpc-smp, linux-image-2.6.28-19-iop32x, linux-image-2.6.32-25-386, linux-image-2.6.24-28-rt, linux-image-2.6.15-55-hppa64, linux-image-2.6.32-25-generic-pae, linux-image-2.6.31-22-powerpc, linux-image-2.6.24-28-sparc64, linux-image-2.6.35-22-versatile, linux-image-2.6.31-22-powerpc64-smp, linux-image-2.6.15-55-powerpc-smp, linux-image-2.6.32-25-server, linux-image-2.6.32-25-versatile, linux-image-2.6.15-55-server, linux-image-2.6.15-55-hppa64-smp, linux-image-2.6.35-22-server, linux-image-2.6.15-55-386, linux-image-2.6.15-55-itanium-smp, linux-image-2.6.28-19-ixp4xx, linux-image-2.6.31-22-server, linux-image-2.6.15-55-itanium, linux-image-2.6.31-22-generic-pae, linux-image-2.6.32-25-sparc64-smp, linux-image-2.6.24-28-server, linux-image-2.6.32-25-powerpc-smp, linux-image-2.6.35-22-generic, linux-image-2.6.15-55-mckinley-smp, linux-image-2.6.15-55-amd64-server, linux-image-2.6.24-28-itanium, linux-image-2.6.32-25-powerpc64-smp, linux-image-2.6.24-28-mckinley, linux-image-2.6.31-22-386, linux-image-2.6.35-22-powerpc-smp, linux-image-2.6.24-28-hppa32, linux-image-2.6.15-55-amd64-xeon, linux-image-2.6.24-28-powerpc-smp, linux-image-2.6.32-309-ec2, linux-image-2.6.15-55-sparc64, linux-image-2.6.15-55-server-bigiron, linux-image-2.6.31-307-ec2, linux-image-2.6.31-22-ia64, linux-image-2.6.15-55-powerpc, linux-image-2.6.15-55-sparc64-smp, linux-image-2.6.28-19-server, linux-image-2.6.24-28-386, linux-image-2.6.32-25-powerpc, linux-image-2.6.15-55-k7, linux-image-2.6.24-28-powerpc64-smp, linux-image-2.6.24-28-virtual, linux-image-2.6.35-22-omap, linux-image-2.6.15-55-hppa32-smp, linux-image-2.6.28-19-imx51, linux-image-2.6.24-28-hppa64, linux-image-2.6.24-28-openvz, linux-image-2.6.35-22-virtual, linux-image-2.6.31-22-sparc64-smp
  • USN-1074-2: linux-image-2.6.31-608-imx51, linux-fsl-imx51
  • USN-1093-1: linux-mvl-dove, linux-image-2.6.32-416-dove, linux-image-2.6.32-216-dove
  • USN-1023-1: linux-image-2.6.15-55-686, linux, linux-image-2.6.24-28-lpiacompat, linux-image-2.6.24-28-generic, linux-image-2.6.24-28-sparc64-smp, linux-source-2.6.15, linux-image-2.6.31-22-lpia, linux-image-2.6.15-55-amd64-generic, linux-image-2.6.15-55-mckinley, linux-image-2.6.24-28-lpia, linux-image-2.6.31-22-generic, linux-image-2.6.32-26-lpia, linux-image-2.6.35-23-generic, linux-image-2.6.15-55-powerpc64-smp, linux-image-2.6.31-22-sparc64, linux-image-2.6.32-26-generic-pae, linux-image-2.6.32-26-server, linux-image-2.6.24-28-powerpc, linux-image-2.6.31-22-virtual, linux-image-2.6.32-26-sparc64-smp, linux-image-2.6.15-55-hppa32, linux-image-2.6.35-23-omap, linux-image-2.6.15-55-amd64-k8, linux-ec2, linux-image-2.6.24-28-xen, linux-image-2.6.35-23-virtual, linux-image-2.6.31-22-powerpc-smp, linux-image-2.6.32-310-ec2, linux-image-2.6.24-28-rt, linux-image-2.6.15-55-hppa64, linux-image-2.6.31-22-powerpc, linux-image-2.6.24-28-sparc64, linux-image-2.6.35-23-powerpc64-smp, linux-image-2.6.32-26-generic, linux-image-2.6.35-23-server, linux-image-2.6.31-22-powerpc64-smp, linux-image-2.6.15-55-powerpc-smp, linux-image-2.6.32-26-powerpc, linux-image-2.6.32-26-sparc64, linux-image-2.6.15-55-server, linux-image-2.6.15-55-hppa64-smp, linux-image-2.6.32-26-ia64, linux-image-2.6.32-26-powerpc-smp, linux-image-2.6.15-55-386, linux-image-2.6.15-55-itanium-smp, linux-image-2.6.31-22-server, linux-image-2.6.15-55-itanium, linux-image-2.6.31-22-generic-pae, linux-image-2.6.24-28-server, linux-image-2.6.15-55-mckinley-smp, linux-image-2.6.32-26-preempt, linux-image-2.6.15-55-amd64-server, linux-image-2.6.24-28-itanium, linux-image-2.6.32-26-versatile, linux-image-2.6.24-28-mckinley, linux-image-2.6.31-22-386, linux-image-2.6.35-23-generic-pae, linux-image-2.6.24-28-hppa32, linux-image-2.6.32-26-powerpc64-smp, linux-image-2.6.32-26-virtual, linux-image-2.6.15-55-amd64-xeon, linux-image-2.6.24-28-powerpc-smp, linux-image-2.6.15-55-sparc64, linux-image-2.6.35-23-powerpc, linux-image-2.6.15-55-server-bigiron, linux-image-2.6.31-307-ec2, linux-image-2.6.31-22-ia64, linux-image-2.6.15-55-powerpc, linux-image-2.6.35-23-powerpc-smp, linux-image-2.6.15-55-sparc64-smp, linux-image-2.6.24-28-386, linux-image-2.6.32-26-386, linux-image-2.6.15-55-k7, linux-image-2.6.24-28-powerpc64-smp, linux-image-2.6.24-28-virtual, linux-image-2.6.15-55-hppa32-smp, linux-image-2.6.24-28-hppa64, linux-image-2.6.24-28-openvz, linux-image-2.6.31-22-sparc64-smp, linux-image-2.6.35-23-versatile
  • USN-1041-1: linux-image-2.6.35-24-versatile, linux-image-2.6.32-27-lpia, linux-image-2.6.32-27-sparc64, linux, linux-image-2.6.31-22-386, linux-image-2.6.32-27-versatile, linux-image-2.6.35-24-omap, linux-image-2.6.35-24-server, linux-image-2.6.31-22-powerpc-smp, linux-image-2.6.32-27-powerpc-smp, linux-image-2.6.35-24-virtual, linux-image-2.6.32-27-generic-pae, linux-image-2.6.35-24-powerpc-smp, linux-image-2.6.31-22-powerpc, linux-image-2.6.31-22-generic-pae, linux-image-2.6.31-22-server, linux-image-2.6.31-22-lpia, linux-image-2.6.32-27-server, linux-image-2.6.31-307-ec2, linux-image-2.6.32-311-ec2, linux-image-2.6.31-22-ia64, linux-image-2.6.32-27-preempt, linux-image-2.6.31-22-powerpc64-smp, linux-image-2.6.31-22-generic, linux-image-2.6.32-27-powerpc, linux-image-2.6.35-24-generic-pae, linux-image-2.6.32-27-powerpc64-smp, linux-image-2.6.32-27-virtual, linux-image-2.6.32-27-sparc64-smp, linux-image-2.6.32-27-386, linux-image-2.6.31-22-sparc64, linux-image-2.6.32-27-generic, linux-image-2.6.35-24-powerpc64-smp, linux-image-2.6.31-22-virtual, linux-image-2.6.31-22-sparc64-smp, linux-image-2.6.35-24-powerpc, linux-ec2, linux-image-2.6.35-24-generic, linux-image-2.6.32-27-ia64
  • USN-988-1: linux-image-2.6.15-55-686, linux, linux-image-2.6.24-28-lpiacompat, linux-image-2.6.24-28-generic, linux-image-2.6.32-24-versatile-dbgsym, linux-image-2.6.24-28-sparc64-smp, linux-image-2.6.28-19-virtual, linux-source-2.6.15, linux-image-2.6.32-24-server, linux-image-2.6.31-22-lpia, linux-image-2.6.15-55-amd64-generic, linux-image-2.6.15-55-mckinley, linux-image-2.6.24-28-lpia, linux-image-2.6.32-24-generic-pae, linux-image-2.6.32-24-powerpc64-smp, linux-image-2.6.32-24-preempt-dbgsym, linux-image-2.6.31-22-generic, linux-image-2.6.28-19-lpia, linux-image-2.6.15-55-powerpc64-smp, linux-image-2.6.31-22-sparc64, linux-image-2.6.28-19-generic, linux-image-2.6.32-24-versatile, linux-image-2.6.24-28-powerpc, linux-image-2.6.31-22-virtual, linux-image-2.6.28-19-versatile, linux-image-2.6.32-24-ia64, linux-image-2.6.15-55-hppa32, linux-image-2.6.15-55-amd64-k8, linux-image-2.6.32-24-virtual, linux-image-2.6.24-28-xen, linux-image-2.6.31-22-powerpc-smp, linux-image-2.6.28-19-iop32x, linux-image-2.6.24-28-rt, linux-image-2.6.15-55-hppa64, linux-image-2.6.31-22-powerpc, linux-image-2.6.32-24-lpia, linux-image-2.6.24-28-sparc64, linux-image-2.6.32-24-generic, linux-image-2.6.32-24-generic-dbgsym, linux-image-2.6.31-22-powerpc64-smp, linux-image-2.6.15-55-powerpc-smp, linux-image-2.6.32-24-powerpc-smp-dbgsym, linux-image-2.6.15-55-server, linux-image-2.6.32-24-lpia-dbgsym, linux-image-2.6.15-55-hppa64-smp, linux-image-2.6.32-24-preempt, linux-image-2.6.32-24-powerpc64-smp-dbgsym, linux-image-2.6.15-55-386, linux-image-2.6.15-55-itanium-smp, linux-image-2.6.28-19-ixp4xx, linux-image-2.6.31-22-server, linux-image-2.6.15-55-itanium, linux-image-2.6.31-22-generic-pae, linux-image-2.6.24-28-server, linux-image-2.6.32-24-sparc64-smp, linux-image-2.6.32-24-sparc64, linux-image-2.6.15-55-mckinley-smp, linux-image-2.6.32-24-generic-pae-dbgsym, linux-image-2.6.32-24-ia64-dbgsym, linux-image-2.6.32-24-sparc64-dbgsym, linux-image-2.6.15-55-amd64-server, linux-image-2.6.32-24-386, linux-image-2.6.24-28-itanium, linux-image-2.6.24-28-mckinley, linux-image-2.6.32-24-386-dbgsym, linux-image-2.6.32-24-powerpc-smp, linux-image-2.6.32-24-powerpc-dbgsym, linux-image-2.6.31-22-386, linux-image-2.6.24-28-hppa32, linux-image-2.6.32-24-powerpc, linux-image-2.6.15-55-amd64-xeon, linux-image-2.6.32-24-sparc64-smp-dbgsym, linux-image-2.6.24-28-powerpc-smp, linux-image-2.6.15-55-sparc64, linux-image-2.6.15-55-server-bigiron, linux-image-2.6.31-22-ia64, linux-image-2.6.15-55-powerpc, linux-image-2.6.15-55-sparc64-smp, linux-image-2.6.28-19-server, linux-image-2.6.24-28-386, linux-image-2.6.15-55-k7, linux-image-2.6.24-28-powerpc64-smp, linux-image-2.6.24-28-virtual, linux-image-2.6.15-55-hppa32-smp, linux-image-2.6.28-19-imx51, linux-image-2.6.24-28-hppa64, linux-image-2.6.24-28-openvz, linux-image-2.6.31-22-sparc64-smp, linux-image-2.6.32-24-server-dbgsym
  • USN-1073-1: linux-image-2.6.31-22-powerpc64-smp, linux-image-2.6.31-22-generic, linux, linux-image-2.6.31-22-386, linux-image-2.6.31-22-generic-pae, linux-image-2.6.31-22-powerpc, linux-image-2.6.31-22-server, linux-image-2.6.31-22-powerpc-smp, linux-image-2.6.31-22-lpia, linux-image-2.6.31-22-virtual, linux-image-2.6.31-22-sparc64, linux-image-2.6.31-22-sparc64-smp, linux-image-2.6.31-307-ec2, linux-ec2, linux-image-2.6.31-22-ia64
  • USN-1080-1: linux-image-2.6.32-29-preempt, linux-image-2.6.32-29-generic, linux-image-2.6.32-29-generic-pae, linux-image-2.6.32-29-server, linux-image-2.6.32-29-powerpc-smp, linux-image-2.6.32-29-sparc64, linux-image-2.6.32-29-virtual, linux, linux-image-2.6.32-29-versatile, linux-image-2.6.32-29-ia64, linux-image-2.6.32-29-lpia, linux-image-2.6.32-29-powerpc, linux-image-2.6.32-29-powerpc64-smp, linux-image-2.6.32-29-386, linux-image-2.6.32-29-sparc64-smp
  • USN-1080-2: linux-ec2, linux-image-2.6.32-313-ec2
  • USN-1164-1: linux-image-2.6.31-609-imx51, linux-fsl-imx51
  • USN-1081-1: linux-image-2.6.35-27-omap, linux-image-2.6.35-27-powerpc-smp, linux, linux-image-2.6.35-27-powerpc64-smp, linux-image-2.6.35-27-virtual, linux-image-2.6.35-27-powerpc, linux-image-2.6.35-27-generic-pae, linux-image-2.6.35-27-generic, linux-image-2.6.35-27-server, linux-image-2.6.35-27-versatile
  • USN-1187-1: linux-image-2.6.35-30-generic, linux-image-2.6.35-30-server, linux-image-2.6.35-30-generic-pae, linux-lts-backport-maverick, linux-image-2.6.35-30-virtual
  • USN-1072-1: linux-image-2.6.24-28-mckinley, linux, linux-image-2.6.24-28-lpiacompat, linux-image-2.6.24-28-xen, linux-image-2.6.24-28-hppa32, linux-image-2.6.24-28-generic, linux-image-2.6.24-28-rt, linux-image-2.6.24-28-sparc64-smp, linux-image-2.6.24-28-powerpc-smp, linux-image-2.6.24-28-sparc64, linux-image-2.6.24-28-server, linux-image-2.6.24-28-lpia, linux-image-2.6.24-28-386, linux-image-2.6.24-28-powerpc64-smp, linux-image-2.6.24-28-virtual, linux-image-2.6.24-28-powerpc, linux-image-2.6.24-28-hppa64, linux-image-2.6.24-28-itanium, linux-image-2.6.24-28-openvz
  • USN-1071-1: linux-image-2.6.15-55-686, linux-image-2.6.15-55-386, linux-image-2.6.15-55-itanium-smp, linux-image-2.6.15-55-amd64-xeon, linux-image-2.6.15-55-hppa64, linux-image-2.6.15-55-itanium, linux-source-2.6.15, linux-image-2.6.15-55-amd64-generic, linux-image-2.6.15-55-sparc64, linux-image-2.6.15-55-mckinley, linux-image-2.6.15-55-server-bigiron, linux-image-2.6.15-55-powerpc, linux-image-2.6.15-55-sparc64-smp, linux-image-2.6.15-55-powerpc-smp, linux-image-2.6.15-55-powerpc64-smp, linux-image-2.6.15-55-k7, linux-image-2.6.15-55-mckinley-smp, linux-image-2.6.15-55-server, linux-image-2.6.15-55-hppa32-smp, linux-image-2.6.15-55-hppa64-smp, linux-image-2.6.15-55-amd64-server, linux-image-2.6.15-55-hppa32, linux-image-2.6.15-55-amd64-k8
  • USN-1054-1: linux-image-2.6.32-28-generic-pae, linux-image-2.6.32-28-powerpc, linux-image-2.6.35-25-powerpc64-smp, linux, linux-image-2.6.35-25-generic-pae, linux-image-2.6.32-28-versatile, linux-image-2.6.35-25-server, linux-image-2.6.32-28-sparc64-smp, linux-image-2.6.35-25-powerpc, linux-image-2.6.32-28-ia64, linux-image-2.6.32-28-lpia, linux-image-2.6.35-25-powerpc-smp, linux-image-2.6.35-25-virtual, linux-image-2.6.35-25-omap, linux-image-2.6.32-28-386, linux-image-2.6.32-28-powerpc-smp, linux-image-2.6.32-28-powerpc64-smp, linux-image-2.6.32-28-generic, linux-image-2.6.32-312-ec2, linux-image-2.6.32-28-server, linux-image-2.6.32-28-virtual, linux-image-2.6.35-25-generic, linux-image-2.6.35-25-versatile, linux-ec2, linux-image-2.6.32-28-sparc64, linux-image-2.6.32-28-preempt
  • USN-1161-1: linux-ec2, linux-image-2.6.32-317-ec2
  • USN-1057-1: linux-image-2.6.15-55-686, linux-image-2.6.15-55-386, linux-image-2.6.15-55-itanium-smp, linux-image-2.6.15-55-amd64-xeon, linux-image-2.6.15-55-hppa64, linux-image-2.6.15-55-itanium, linux-source-2.6.15, linux-image-2.6.15-55-amd64-generic, linux-image-2.6.15-55-sparc64, linux-image-2.6.15-55-mckinley, linux-image-2.6.15-55-server-bigiron, linux-image-2.6.15-55-powerpc, linux-image-2.6.15-55-sparc64-smp, linux-image-2.6.15-55-powerpc-smp, linux-image-2.6.15-55-powerpc64-smp, linux-image-2.6.15-55-k7, linux-image-2.6.15-55-mckinley-smp, linux-image-2.6.15-55-server, linux-image-2.6.15-55-hppa32-smp, linux-image-2.6.15-55-hppa64-smp, linux-image-2.6.15-55-amd64-server, linux-image-2.6.15-55-hppa32, linux-image-2.6.15-55-amd64-k8
  • USN-1092-1: linux-image-2.6.15-57-amd64-k8, linux-image-2.6.15-57-amd64-server, linux-image-2.6.15-57-amd64-xeon, linux-image-2.6.15-57-mckinley, linux-image-2.6.15-57-powerpc, linux-image-2.6.15-57-sparc64-smp, linux-image-2.6.15-57-hppa32, linux-image-2.6.15-57-k7, linux-source-2.6.15, linux-image-2.6.15-57-itanium-smp, linux-image-2.6.15-57-amd64-generic, linux-image-2.6.15-57-hppa32-smp, linux-image-2.6.15-57-686, linux-image-2.6.15-57-hppa64, linux-image-2.6.15-57-hppa64-smp, linux-image-2.6.15-57-server, linux-image-2.6.15-57-itanium, linux-image-2.6.15-57-server-bigiron, linux-image-2.6.15-57-powerpc64-smp, linux-image-2.6.15-57-sparc64, linux-image-2.6.15-57-386, linux-image-2.6.15-57-mckinley-smp, linux-image-2.6.15-57-powerpc-smp
  • USN-1089-1: linux-image-2.6.31-23-server, linux-image-2.6.31-23-powerpc64-smp, linux, linux-image-2.6.31-23-generic, linux-image-2.6.31-308-ec2, linux-image-2.6.31-23-virtual, linux-image-2.6.31-23-sparc64-smp, linux-image-2.6.31-23-ia64, linux-image-2.6.31-23-powerpc-smp, linux-image-2.6.31-23-sparc64, linux-ec2, linux-image-2.6.31-23-386, linux-image-2.6.31-23-generic-pae, linux-image-2.6.31-23-lpia, linux-image-2.6.31-23-powerpc
  • USN-1105-1: linux, linux-image-2.6.24-29-server, linux-image-2.6.24-29-rt, linux-image-2.6.24-29-itanium, linux-image-2.6.24-29-sparc64, linux-image-2.6.24-29-sparc64-smp, linux-image-2.6.24-29-openvz, linux-image-2.6.24-29-powerpc64-smp, linux-image-2.6.24-29-386, linux-image-2.6.24-29-hppa32, linux-image-2.6.24-29-powerpc-smp, linux-image-2.6.24-29-virtual, linux-image-2.6.24-29-mckinley, linux-image-2.6.24-29-xen, linux-image-2.6.24-29-generic, linux-image-2.6.24-29-lpiacompat, linux-image-2.6.24-29-hppa64, linux-image-2.6.24-29-lpia, linux-image-2.6.24-29-powerpc
  • USN-1204-1: linux-image-2.6.31-610-imx51, linux-fsl-imx51
  • USN-1086-1: linux-ec2, linux-image-2.6.32-314-ec2
  • USN-1111-1: linux-image-2.6.15-57-amd64-k8, linux-image-2.6.15-57-amd64-server, linux-image-2.6.15-57-amd64-xeon, linux-image-2.6.15-57-mckinley, linux-image-2.6.15-57-powerpc, linux-image-2.6.15-57-sparc64-smp, linux-image-2.6.15-57-hppa32, linux-image-2.6.15-57-k7, linux-source-2.6.15, linux-image-2.6.15-57-itanium-smp, linux-image-2.6.15-57-amd64-generic, linux-image-2.6.15-57-hppa32-smp, linux-image-2.6.15-57-686, linux-image-2.6.15-57-hppa64, linux-image-2.6.15-57-hppa64-smp, linux-image-2.6.15-57-server, linux-image-2.6.15-57-itanium, linux-image-2.6.15-57-server-bigiron, linux-image-2.6.15-57-powerpc64-smp, linux-image-2.6.15-57-sparc64, linux-image-2.6.15-57-386, linux-image-2.6.15-57-mckinley-smp, linux-image-2.6.15-57-powerpc-smp
  • USN-1186-1: linux, linux-image-2.6.24-29-server, linux-image-2.6.24-29-rt, linux-image-2.6.24-29-itanium, linux-image-2.6.24-29-sparc64, linux-image-2.6.24-29-sparc64-smp, linux-image-2.6.24-29-openvz, linux-image-2.6.24-29-powerpc64-smp, linux-image-2.6.24-29-386, linux-image-2.6.24-29-hppa32, linux-image-2.6.24-29-powerpc-smp, linux-image-2.6.24-29-virtual, linux-image-2.6.24-29-mckinley, linux-image-2.6.24-29-xen, linux-image-2.6.24-29-generic, linux-image-2.6.24-29-lpiacompat, linux-image-2.6.24-29-hppa64, linux-image-2.6.24-29-lpia, linux-image-2.6.24-29-powerpc
  • USN-1141-1: linux-image-2.6.32-32-sparc64, linux-image-2.6.32-32-virtual, linux-image-2.6.32-32-sparc64-smp, linux, linux-image-2.6.32-32-preempt, linux-image-2.6.32-32-versatile, linux-image-2.6.32-32-server, linux-image-2.6.32-32-powerpc-smp, linux-image-2.6.32-32-386, linux-image-2.6.32-32-powerpc, linux-image-2.6.32-32-lpia, linux-image-2.6.32-32-generic, linux-ec2, linux-image-2.6.32-32-ia64, linux-image-2.6.32-316-ec2, linux-image-2.6.32-32-generic-pae, linux-image-2.6.32-32-powerpc64-smp
  • USN-1133-1: linux, linux-image-2.6.24-29-server, linux-image-2.6.24-29-rt, linux-image-2.6.24-29-itanium, linux-image-2.6.24-29-sparc64, linux-image-2.6.24-29-sparc64-smp, linux-image-2.6.24-29-openvz, linux-image-2.6.24-29-powerpc64-smp, linux-image-2.6.24-29-386, linux-image-2.6.24-29-hppa32, linux-image-2.6.24-29-powerpc-smp, linux-image-2.6.24-29-virtual, linux-image-2.6.24-29-mckinley, linux-image-2.6.24-29-xen, linux-image-2.6.24-29-generic, linux-image-2.6.24-29-lpiacompat, linux-image-2.6.24-29-hppa64, linux-image-2.6.24-29-lpia, linux-image-2.6.24-29-powerpc
  • USN-1162-1: linux-mvl-dove, linux-image-2.6.32-217-dove
  • USN-1159-1: linux-mvl-dove, linux-image-2.6.32-417-dove
  • USN-1160-1: linux-image-2.6.35-30-powerpc64-smp, linux-image-2.6.35-30-generic, linux-image-2.6.35-30-server, linux-image-2.6.35-30-powerpc-smp, linux, linux-image-2.6.35-30-generic-pae, linux-image-2.6.35-30-versatile, linux-image-2.6.35-30-omap, linux-image-2.6.35-30-powerpc, linux-image-2.6.35-30-virtual