[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted user-mode-linux 2.6.18-1um-2etch.26etch2 (source i386)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 22 Feb 2010 18:16:29 -0700
Source: user-mode-linux
Binary: user-mode-linux
Architecture: source i386
Version: 2.6.18-1um-2etch.26etch2
Distribution: oldstable-security
Urgency: high
Maintainer: User Mode Linux Maintainers <pkg-uml-pkgs@lists.alioth.debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description: 
 user-mode-linux - User-mode Linux (kernel)
Closes: 520034 529165 562525
Changes: 
 user-mode-linux (2.6.18-1um-2etch.26etch2) oldstable-security; urgency=high
 .
   * Rebuild against linux-source-2.6.18_2.6.18.dfsg.1-26etch2:
     * [s390] Revert syscall wrapping of execve() - 2.6.18 still
       has some in-kernel callers which bollocks up pt_regs.
       (Closes: #562525)
     * [SCSI] gdth: Prevent negative offsets in ioctl (CVE-2009-3080)
     * NFSv4: Fix a problem whereby a buggy server can oops the kernel
       (CVE-2009-3726)
     * isdn: hfc_usb: Fix read buffer overflow (CVE-2009-4005)
     * hfs: fix a potential buffer overflow (CVE-2009-4020)
     * fuse: prevent fuse_put_request on invalid pointer (CVE-2009-4021)
     * e1000: enhance frame fragment detection (CVE-2009-4536)
     * netfilter: ebtables: enforce CAP_NET_ADMIN (CVE-2010-0007)
     * connector: Delete buggy notification code. (CVE-2010-0410)
     * Fix potential crash with sys_move_pages (CVE-2010-0415)
     * futex: Handle user space corruption gracefully (CVE-2010-0622)
     * [s390] Fix missing capability check in z90crypt driver (CVE-2009-1883)
     * net ax25: Fix signed comparison in the sockopt handler (CVE-2009-2909)
     * fix information leak in llc_ui_getname (CVE-2009-3001)
     * net: fix information leak due to uninitialized structures in
       getname functions (CVE-2009-3002)
     * tc: Fix uninitialized kernel memory leak (CVE-2009-3228)
     * random: make get_random_int() more random (CVE-2009-3238)
     * NFSv4: fix open-create permissions, move iattr & verf attributes of
       struct nfsd4_open out of the union (CVE-2009-3286)
     * fs: pipe.c null pointer dereference (CVE-2009-3547)
     * netlink: fix typo in initialization (CVE-2009-3612)
     * AF_UNIX: Fix deadlock on connecting to shutdown socket (CVE-2009-3621)
     * [mips/mipsel] Fix errno on inexistent syscalls. (Closes: #520034).
     * bridge: Fix oops in port_carrier_check (closes: #529165)
Files: 
 c32b65bd3829d1d7349827e664cd9422 893 misc extra user-mode-linux_2.6.18-1um-2etch.26etch2.dsc
 c63ce16a717b7b40c92e8f3db5e9562b 20338 misc extra user-mode-linux_2.6.18-1um-2etch.26etch2.diff.gz
 c8263e70b1f6c46004502d2a561c5b3f 25603308 misc extra user-mode-linux_2.6.18-1um-2etch.26etch2_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iD8DBQFLg1EBhuANDBmkLRkRAj0TAJ0TwdGPWcVplcLjoCRHpuHOejLiQACeN/GS
j3MelIowjlOlADoYJE1UmVI=
=TqsM
-----END PGP SIGNATURE-----


Accepted:
user-mode-linux_2.6.18-1um-2etch.26etch2.diff.gz
  to main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.26etch2.diff.gz
user-mode-linux_2.6.18-1um-2etch.26etch2.dsc
  to main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.26etch2.dsc
user-mode-linux_2.6.18-1um-2etch.26etch2_i386.deb
  to main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.26etch2_i386.deb


Reply to: