Accepted user-mode-linux 2.6.18-1um-2etch.26etch2 (source i386)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Mon, 22 Feb 2010 18:16:29 -0700
Source: user-mode-linux
Binary: user-mode-linux
Architecture: source i386
Version: 2.6.18-1um-2etch.26etch2
Distribution: oldstable-security
Urgency: high
Maintainer: User Mode Linux Maintainers <pkg-uml-pkgs@lists.alioth.debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description:
user-mode-linux - User-mode Linux (kernel)
Closes: 520034 529165 562525
Changes:
user-mode-linux (2.6.18-1um-2etch.26etch2) oldstable-security; urgency=high
.
* Rebuild against linux-source-2.6.18_2.6.18.dfsg.1-26etch2:
* [s390] Revert syscall wrapping of execve() - 2.6.18 still
has some in-kernel callers which bollocks up pt_regs.
(Closes: #562525)
* [SCSI] gdth: Prevent negative offsets in ioctl (CVE-2009-3080)
* NFSv4: Fix a problem whereby a buggy server can oops the kernel
(CVE-2009-3726)
* isdn: hfc_usb: Fix read buffer overflow (CVE-2009-4005)
* hfs: fix a potential buffer overflow (CVE-2009-4020)
* fuse: prevent fuse_put_request on invalid pointer (CVE-2009-4021)
* e1000: enhance frame fragment detection (CVE-2009-4536)
* netfilter: ebtables: enforce CAP_NET_ADMIN (CVE-2010-0007)
* connector: Delete buggy notification code. (CVE-2010-0410)
* Fix potential crash with sys_move_pages (CVE-2010-0415)
* futex: Handle user space corruption gracefully (CVE-2010-0622)
* [s390] Fix missing capability check in z90crypt driver (CVE-2009-1883)
* net ax25: Fix signed comparison in the sockopt handler (CVE-2009-2909)
* fix information leak in llc_ui_getname (CVE-2009-3001)
* net: fix information leak due to uninitialized structures in
getname functions (CVE-2009-3002)
* tc: Fix uninitialized kernel memory leak (CVE-2009-3228)
* random: make get_random_int() more random (CVE-2009-3238)
* NFSv4: fix open-create permissions, move iattr & verf attributes of
struct nfsd4_open out of the union (CVE-2009-3286)
* fs: pipe.c null pointer dereference (CVE-2009-3547)
* netlink: fix typo in initialization (CVE-2009-3612)
* AF_UNIX: Fix deadlock on connecting to shutdown socket (CVE-2009-3621)
* [mips/mipsel] Fix errno on inexistent syscalls. (Closes: #520034).
* bridge: Fix oops in port_carrier_check (closes: #529165)
Files:
c32b65bd3829d1d7349827e664cd9422 893 misc extra user-mode-linux_2.6.18-1um-2etch.26etch2.dsc
c63ce16a717b7b40c92e8f3db5e9562b 20338 misc extra user-mode-linux_2.6.18-1um-2etch.26etch2.diff.gz
c8263e70b1f6c46004502d2a561c5b3f 25603308 misc extra user-mode-linux_2.6.18-1um-2etch.26etch2_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iD8DBQFLg1EBhuANDBmkLRkRAj0TAJ0TwdGPWcVplcLjoCRHpuHOejLiQACeN/GS
j3MelIowjlOlADoYJE1UmVI=
=TqsM
-----END PGP SIGNATURE-----
Accepted:
user-mode-linux_2.6.18-1um-2etch.26etch2.diff.gz
to main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.26etch2.diff.gz
user-mode-linux_2.6.18-1um-2etch.26etch2.dsc
to main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.26etch2.dsc
user-mode-linux_2.6.18-1um-2etch.26etch2_i386.deb
to main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.26etch2_i386.deb
Reply to: