-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Sun, 14 Feb 2010 12:24:45 -0700 Source: user-mode-linux Binary: user-mode-linux Architecture: source i386 Version: 2.6.26-1um-2+21lenny3 Distribution: stable-security Urgency: high Maintainer: User Mode Linux Maintainers <pkg-uml-pkgs@lists.alioth.debian.org> Changed-By: dann frazier <dannf@debian.org> Description: user-mode-linux - User-mode Linux (kernel) Closes: 567689 Changes: user-mode-linux (2.6.26-1um-2+21lenny3) stable-security; urgency=high . * Rebuild against linux-source-2.6.26 (2.6.26-21lenny3): * mac80211: fix spurious delBA handling (CVE-2009-4027) * e1000: enhance frame fragment detection (CVE-2009-4536) * e1000e: enhance frame fragment detection (CVE-2009-4538) * Fix several issues with mmap/mremap (CVE-2010-0291) * [SCSI] megaraid_sas: remove sysfs poll_mode_io world writeable permissions (CVE-2009-3939) * kernel/signal.c: fix kernel information leak with print-fatal-signals=1 (CVE-2010-0003) * netfilter: ebtables: enforce CAP_NET_ADMIN (CVE-2010-0007) * Fix build failure on hppa & mipsen due to missing #include * Port CVE-2010-0291 fix to xen featureset * cdc_ether: Do not set link down initially; not all devices send link change interrupts (Closes: #567689) * Split 'flush_old_exec' into two functions (CVE-2010-0307) * Additional fixes for CVE-2010-0307 * Build fix for CVE-2010-0291 change on powerpc64 * KVM: PIT: control word is write-only (CVE-2010-0309) * connector: Delete buggy notification code. (CVE-2010-0410) * Fix potential crash with sys_move_pages (CVE-2010-0415) * KVM: emulator privilege escalation (CVE-2010-0298) * KVM: emulator privilege escalation IOPL/CPL level check (CVE-2010-0306) Checksums-Sha1: b2b7298f17933667f606d5f83f499ad9c063d4d1 1273 user-mode-linux_2.6.26-1um-2+21lenny3.dsc 826e17376931ac935c366b10910ba3a0ef172b50 17064 user-mode-linux_2.6.26-1um-2+21lenny3.diff.gz 9791668697e8032729aee33f38ccc68f254047f6 5360840 user-mode-linux_2.6.26-1um-2+21lenny3_i386.deb Checksums-Sha256: 386cbedf55c663bcf62e2fc3fa5499f707403e18faa175c1aaa811ca7228b294 1273 user-mode-linux_2.6.26-1um-2+21lenny3.dsc f8e52da145767074ce7b17a8abf877874688eeb677cb56a5cadec13c974e233c 17064 user-mode-linux_2.6.26-1um-2+21lenny3.diff.gz 6433edb7fd4855acd3abab6d904e795639121877c873e6ab4b19fcf75ec3c757 5360840 user-mode-linux_2.6.26-1um-2+21lenny3_i386.deb Files: bf0598d0305a5554258a52459c99ed5e 1273 misc extra user-mode-linux_2.6.26-1um-2+21lenny3.dsc 0ca761888d7e3eb4381cb852ff02c125 17064 misc extra user-mode-linux_2.6.26-1um-2+21lenny3.diff.gz b8a925abed43285a10d94b00e1c46ce7 5360840 misc extra user-mode-linux_2.6.26-1um-2+21lenny3_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iD8DBQFLeF6bhuANDBmkLRkRAqcXAJwKNbowQ+IOn/ldsLkR5vf98UuUdACdGyyP EhnbNZpWnY7r4fUwxxy88AE= =lZ01 -----END PGP SIGNATURE----- Accepted: user-mode-linux_2.6.26-1um-2+21lenny3.diff.gz to main/u/user-mode-linux/user-mode-linux_2.6.26-1um-2+21lenny3.diff.gz user-mode-linux_2.6.26-1um-2+21lenny3.dsc to main/u/user-mode-linux/user-mode-linux_2.6.26-1um-2+21lenny3.dsc user-mode-linux_2.6.26-1um-2+21lenny3_i386.deb to main/u/user-mode-linux/user-mode-linux_2.6.26-1um-2+21lenny3_i386.deb