[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted user-mode-linux 2.6.26-1um-2+21lenny3 (source i386)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sun, 14 Feb 2010 12:24:45 -0700
Source: user-mode-linux
Binary: user-mode-linux
Architecture: source i386
Version: 2.6.26-1um-2+21lenny3
Distribution: stable-security
Urgency: high
Maintainer: User Mode Linux Maintainers <pkg-uml-pkgs@lists.alioth.debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description: 
 user-mode-linux - User-mode Linux (kernel)
Closes: 567689
Changes: 
 user-mode-linux (2.6.26-1um-2+21lenny3) stable-security; urgency=high
 .
   * Rebuild against linux-source-2.6.26 (2.6.26-21lenny3):
     * mac80211: fix spurious delBA handling (CVE-2009-4027)
     * e1000: enhance frame fragment detection (CVE-2009-4536)
     * e1000e: enhance frame fragment detection (CVE-2009-4538)
     * Fix several issues with mmap/mremap (CVE-2010-0291)
     * [SCSI] megaraid_sas: remove sysfs poll_mode_io world writeable
       permissions (CVE-2009-3939)
     * kernel/signal.c: fix kernel information leak with print-fatal-signals=1
       (CVE-2010-0003)
     * netfilter: ebtables: enforce CAP_NET_ADMIN (CVE-2010-0007)
     * Fix build failure on hppa & mipsen due to missing #include
     * Port CVE-2010-0291 fix to xen featureset
     * cdc_ether: Do not set link down initially; not all devices send link
       change interrupts (Closes: #567689)
     * Split 'flush_old_exec' into two functions (CVE-2010-0307)
     * Additional fixes for CVE-2010-0307
     * Build fix for CVE-2010-0291 change on powerpc64
     * KVM: PIT: control word is write-only (CVE-2010-0309)
     * connector: Delete buggy notification code. (CVE-2010-0410)
     * Fix potential crash with sys_move_pages (CVE-2010-0415)
     * KVM: emulator privilege escalation (CVE-2010-0298)
     * KVM: emulator privilege escalation IOPL/CPL level check (CVE-2010-0306)
Checksums-Sha1: 
 b2b7298f17933667f606d5f83f499ad9c063d4d1 1273 user-mode-linux_2.6.26-1um-2+21lenny3.dsc
 826e17376931ac935c366b10910ba3a0ef172b50 17064 user-mode-linux_2.6.26-1um-2+21lenny3.diff.gz
 9791668697e8032729aee33f38ccc68f254047f6 5360840 user-mode-linux_2.6.26-1um-2+21lenny3_i386.deb
Checksums-Sha256: 
 386cbedf55c663bcf62e2fc3fa5499f707403e18faa175c1aaa811ca7228b294 1273 user-mode-linux_2.6.26-1um-2+21lenny3.dsc
 f8e52da145767074ce7b17a8abf877874688eeb677cb56a5cadec13c974e233c 17064 user-mode-linux_2.6.26-1um-2+21lenny3.diff.gz
 6433edb7fd4855acd3abab6d904e795639121877c873e6ab4b19fcf75ec3c757 5360840 user-mode-linux_2.6.26-1um-2+21lenny3_i386.deb
Files: 
 bf0598d0305a5554258a52459c99ed5e 1273 misc extra user-mode-linux_2.6.26-1um-2+21lenny3.dsc
 0ca761888d7e3eb4381cb852ff02c125 17064 misc extra user-mode-linux_2.6.26-1um-2+21lenny3.diff.gz
 b8a925abed43285a10d94b00e1c46ce7 5360840 misc extra user-mode-linux_2.6.26-1um-2+21lenny3_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iD8DBQFLeF6bhuANDBmkLRkRAqcXAJwKNbowQ+IOn/ldsLkR5vf98UuUdACdGyyP
EhnbNZpWnY7r4fUwxxy88AE=
=lZ01
-----END PGP SIGNATURE-----


Accepted:
user-mode-linux_2.6.26-1um-2+21lenny3.diff.gz
  to main/u/user-mode-linux/user-mode-linux_2.6.26-1um-2+21lenny3.diff.gz
user-mode-linux_2.6.26-1um-2+21lenny3.dsc
  to main/u/user-mode-linux/user-mode-linux_2.6.26-1um-2+21lenny3.dsc
user-mode-linux_2.6.26-1um-2+21lenny3_i386.deb
  to main/u/user-mode-linux/user-mode-linux_2.6.26-1um-2+21lenny3_i386.deb


Reply to: