-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Mon, 26 Mar 2012 16:16:04 -0600 Source: user-mode-linux Binary: user-mode-linux Architecture: source amd64 Version: 2.6.32-1um-4+41squeeze2 Distribution: stable-security Urgency: high Maintainer: User Mode Linux Maintainers <pkg-uml-pkgs@lists.alioth.debian.org> Changed-By: dann frazier <dannf@debian.org> Description: user-mode-linux - User-mode Linux (kernel) Changes: user-mode-linux (2.6.32-1um-4+41squeeze2) stable-security; urgency=high . * Rebuild against linux-source-2.6.32 (2.6.32-41squeeze2): * ext4: fix undefined behavior in ext4_fill_flex_info() (CVE-2009-4307) * ecryptfs: Add mount option to check uid of device being mounted = expect uid (CVE-2011-1833) * KVM: Remove ability to assign devices without IOMMU support * KVM: Check permissions before permitting device assignment (CVE-2011-4347) * Fix CVE-2012-0045, with backport work from Ben Hutchings: - KVM: extend "struct x86_emulate_ops" with "get_cpuid" - KVM: syscall instruction induced guest panic * V4L/DVB: v4l2-ioctl: integer overflow in video_usercopy() * drm: Fix authentication kernel crash * relay: prevent integer overflow in relay_open() * Further refine the fix for CVE-2011-4127: - sd_compat_ioctl: Replace ENOTTY error with ENOIOCTLCMD - kernel.h: fix wrong usage of __ratelimit() - printk_ratelimited(): fix uninitialized spinlock * cifs: fix dentry refcount leak when opening a FIFO on lookup (CVE-2012-1090) * regset: Prevent null pointer reference on readonly regsets (CVE-2012-1097) * eCryptfs: Make truncate path killable * eCryptfs: Infinite loop due to overflow in ecryptfs_write() * cdrom: use copy_to_user() without the underscores Checksums-Sha1: 4630e8138c2d1e3297f53d7f6c96d6c6a6a20d81 2070 user-mode-linux_2.6.32-1um-4+41squeeze2.dsc 8afde81990823f97eb0055c548150056702234e4 19928 user-mode-linux_2.6.32-1um-4+41squeeze2.diff.gz 714f1214916518f76360e98ef640693c061617d0 7081754 user-mode-linux_2.6.32-1um-4+41squeeze2_amd64.deb Checksums-Sha256: 418ef5e01e215b3ff66100715a2dca727dd5f11f8a2da60ac747afaaa3c62c95 2070 user-mode-linux_2.6.32-1um-4+41squeeze2.dsc b472b98e8ab43c63aebd6f4af00c52425e78e0928544bdf58f97bf003fea8fa6 19928 user-mode-linux_2.6.32-1um-4+41squeeze2.diff.gz 270c71187cac792c987de689a0189e0a0b876e9247b590c7fa821220da03cc18 7081754 user-mode-linux_2.6.32-1um-4+41squeeze2_amd64.deb Files: 0e9890a8442beb6a40a0fcf0d7fe7bd1 2070 kernel extra user-mode-linux_2.6.32-1um-4+41squeeze2.dsc f9a4c30f2644a3cad8ce3c079f6bc00b 19928 kernel extra user-mode-linux_2.6.32-1um-4+41squeeze2.diff.gz 19a48955599573252a21ab42554e4075 7081754 kernel extra user-mode-linux_2.6.32-1um-4+41squeeze2_amd64.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBAgAGBQJPcPXlAAoJEBv4PF5U/IZAcXAQAIkO47OOk9BJwjLFABtO5FEd W7EnbzejaufjtQXgYIGP4MSy5Ris06CwlupqHZ8UWGWpABUs/mfGbri56+t/Jh/D wcrac+hnDv0e1TWs3Vt9yH/5fZlPKo7c+RkiyBbLZifjti2gmRAW58FtFmKgDeTU +n2EqlffQR0IhbjdNZLDkatPlbohfo3e6BmhdG/3idcfGCRjBmwfqutyCozLGJLn Qurp2ewp8FvtCeLES0/+nZixMecmeM1j3JQsedjhLY13kJkR5eguSTF9PYTvH3MQ pBJljuFm62RMtrWR61/rAuZsmHmZPXCQDvJFUImpXAoZsIcMVxFKQJS8WnKps5nk 0+fMvmtl2OciBwKhXdcGkgwDEsPub5Bl866Tyr0FiZKt8RtiuJ5uAc2tUkPHTjx7 o6X8u+l7M/u+kFGujLakqritRrzOiSnAgdkk90+Rqz1XNnsHdhY2SlSA0SKaL86v d7qLyrj9T65LjM7TpPYB6m/P0oASBnpoXaP5ArMdkHX/GfCfaVT7/HzPoB6bwPkQ rAryWYzkLOE/XTLnZXB/sSLwI4zMZzMxMnMlVP5eH9WU0OLVfL/ckqlglwHpnV6P S2ZIwltO7OadscQXp4UlI+6eZpi3weMeuA7LXwMsi1y+uebzjV4jZLqhtE1UH2j/ huL07M2qYbEy+X0Unk35 =OdSC -----END PGP SIGNATURE----- Accepted: user-mode-linux_2.6.32-1um-4+41squeeze2.diff.gz to main/u/user-mode-linux/user-mode-linux_2.6.32-1um-4+41squeeze2.diff.gz user-mode-linux_2.6.32-1um-4+41squeeze2.dsc to main/u/user-mode-linux/user-mode-linux_2.6.32-1um-4+41squeeze2.dsc user-mode-linux_2.6.32-1um-4+41squeeze2_amd64.deb to main/u/user-mode-linux/user-mode-linux_2.6.32-1um-4+41squeeze2_amd64.deb