-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Fri, 17 Sep 2010 10:20:00 -0600 Source: user-mode-linux Binary: user-mode-linux Architecture: source i386 Version: 2.6.26-1um-2+25lenny1 Distribution: stable-security Urgency: high Maintainer: User Mode Linux Maintainers <pkg-uml-pkgs@lists.alioth.debian.org> Changed-By: dann frazier <dannf@debian.org> Description: user-mode-linux - User-mode Linux (kernel) Changes: user-mode-linux (2.6.26-1um-2+25lenny1) stable-security; urgency=high . * Rebuild against linux-source-2.6.26 (2.6.26-25lenny1), including changes from linux-source-2.6.26 (2.6.26-25): * irda: Correctly clean up self->ias_obj on irda_bind() failure. (CVE-2010-2954) * compat: Make compat_alloc_user_space() incorporate the access_ok() (CVE-2010-3081) * ALSA: seq/oss - Fix double-free at error path of snd_seq_oss_open() (CVE-2010-3080) * xfs: prevent reading uninitialized stack memory (CVE-2010-3078) * ecryptfs: Bugfix for error related to ecryptfs_hash_buckets (CVE-2010-2492) * pid_ns: Ensure that child_reaper is always valid (See: #570350) * [xen] Fix deadlock in timer interrupt, thanks to Zdenek Salvet (See: #534880) * e1000e: Add support for 82567LM-4, 82567LM-3, 82567LF-3 and 82583V controllers (See: #512546) * parport: quickfix the proc registration bug (See: #588672); ignore ABI changes in parport and parport_pc * Add guard page for stacks that grow up, an additional fix for CVE-2010-2240 * mm: make stack guard page logic use vm_prev pointer, an additional fix for CVE-2010-2240 * net sched: fix some kernel memory leaks (CVE-2010-2942) * jfs: don't allow os2 xattr namespace overlap with others (CVE-2010-2946) Checksums-Sha1: c30ec49498fcb59cba5180dafa0da3937aca9e2d 1273 user-mode-linux_2.6.26-1um-2+25lenny1.dsc d8607926881acdb36c236f2633173f684a5fe7aa 19539 user-mode-linux_2.6.26-1um-2+25lenny1.diff.gz 42e9769e7e2b888174818c35e0acf9f8098c3036 5363828 user-mode-linux_2.6.26-1um-2+25lenny1_i386.deb Checksums-Sha256: 65bf31362a68d4e85d9b1a699e435209d70e12ed9b667a473ff0825c07ff9f58 1273 user-mode-linux_2.6.26-1um-2+25lenny1.dsc e4fc928d7c516fc02c431e98cea519706186690db85b0f0d339baabb788790b3 19539 user-mode-linux_2.6.26-1um-2+25lenny1.diff.gz 23a46ba170108e93d82e94cd82aa2e009d15f529057297e9a992def8e2a302c4 5363828 user-mode-linux_2.6.26-1um-2+25lenny1_i386.deb Files: bf8270fca5d43cdf52c6cc286ea31b9f 1273 misc extra user-mode-linux_2.6.26-1um-2+25lenny1.dsc 536132ded47e5f5dace486c189f096a6 19539 misc extra user-mode-linux_2.6.26-1um-2+25lenny1.diff.gz 4eb520deb4601ca08b559d4c4594629e 5363828 misc extra user-mode-linux_2.6.26-1um-2+25lenny1_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iD8DBQFMk577huANDBmkLRkRArzWAJ47s229VXd0cfT+aL4e748htxg9+gCfeRFV GS8IwLUs+23u9/dnAodRXbI= =Sh92 -----END PGP SIGNATURE----- Accepted: user-mode-linux_2.6.26-1um-2+25lenny1.diff.gz to main/u/user-mode-linux/user-mode-linux_2.6.26-1um-2+25lenny1.diff.gz user-mode-linux_2.6.26-1um-2+25lenny1.dsc to main/u/user-mode-linux/user-mode-linux_2.6.26-1um-2+25lenny1.dsc user-mode-linux_2.6.26-1um-2+25lenny1_i386.deb to main/u/user-mode-linux/user-mode-linux_2.6.26-1um-2+25lenny1_i386.deb