-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Sat, 29 Jan 2011 19:35:42 -0600 Source: user-mode-linux Binary: user-mode-linux Architecture: i386 Version: 2.6.26-1um-2+26lenny2 Distribution: stable-security Urgency: high Maintainer: i386 Build Daemon (murphy) Changed-By: dann frazier Description: user-mode-linux - User-mode Linux (kernel) Changes: user-mode-linux (2.6.26-1um-2+26lenny2) stable-security; urgency=high . * Rebuild against linux-source-2.6.26 (2.6.26-26lenny2): * filter: make sure filters dont read uninitialized memory (CVE-2010-4158) * bio: take care not overflow page count when mapping/copying user data (CVE-2010-4162) * block: check for proper length of iov entries in blk_rq_map_user_iov() (CVE-2010-4163) * bluetooth: Fix missing NULL check (CVE-2010-4242) * posix-cpu-timers: workaround to suppress the problems with mt exec (CVE-2010-4248) * KVM: VMX: fix vmx null pointer dereference on debug register access (CVE-2010-0435) * exec: make argv/envp memory visible to oom-killer (CVE-2010-4243) * af_unix: limit unix_tot_inflight (CVE-2010-4249) * do_exit(): make sure that we run with get_fs() == USER_DS (CVE-2010-4258) * econet: Disable auto-loading as mitigation against local exploits. This module has been shown to be broken, so this risk of this affecting real users is insignificant. * econet: Fix crash in aun_incoming() (CVE-2010-4342) * install_special_mapping skips security_file_mmap check (CVE-2010-4346) * CAN: Use inode instead of kernel address for /proc file (CVE-2010-4565) * IB/uverbs: Handle large number of entries in poll CQ (CVE-2010-4649) * block: check for proper length of iov entries earlier in blk_rq_map_user_iov() (CVE-2010-4668) * av7110: check for negative array offset (CVE-2011-0521) * usb: iowarrior: don't trust report_size for buffer size (CVE-2010-4656) * blkback/blktap/netback: Fix CVE-2010-3699 * sctp: Fix a race between ICMP protocol unreachable and connect() (CVE-2010-4526) * sound: Prevent buffer overflow in OSS load_mixer_volumes (CVE-2010-4527) * irda: prevent integer underflow in IRLMP_ENUMDEVICES (CVE-2010-4529) Checksums-Sha1: e297341978cb73b39bd36871bf82a4e37193f57a 5391102 user-mode-linux_2.6.26-1um-2+26lenny2_i386.deb Checksums-Sha256: ff298d578637d40f712f490efb6e75f46a8bf6abf50a5dc68498fd3be1f0c21a 5391102 user-mode-linux_2.6.26-1um-2+26lenny2_i386.deb Files: e83b71d62ea47b4fdb9b455d66e459f3 5391102 misc extra user-mode-linux_2.6.26-1um-2+26lenny2_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQIcBAEBCAAGBQJNRP0TAAoJEBv4PF5U/IZA8UcP/Au/kwlnzbWHWT3pLGFlqWVs qnLS4sngKHMxAwWB+WNAfTtqAg+BaaHEMeVahcGzTaNuYfSD7wsT1h1lmkSOCRnk 6jd42ZXmaGWfxFytIDdTje6T/sL6YrCGZcTcqmzq9jT3EWFCMkAl3R5hdkUAtPUE ummfIQ8p+bNkmZSLq9Weovadnoc5d4HL19yXSZQXmtkiXNs9toyO4fkyQFU9LUtQ UbhWLX9FKY3TlGQDxpdiy6NT7x+abegrknF6MsZfXQeTu3+osj0s4zqhMOx/73O5 RcsNiBJASSh27JWbeapK15RY9FfTK8+Yzwys9+gyABGlY2AGTe8GbSHvdrCvtfa3 TuBX41IiNHqi0vN/3DnP/OTwPkplHh6NTGdL6Nk+vUACUAHgpaDXSDuiTHtauuQu SpOJbdapOKQkjaQxErGrTSc60LauyweQWtYUjd7aVC4Nl0XBIENNtd2Uf8MP+WkW LNlyTzXYiypZnZbKLmQ76SrEfICzkOQIoljpD3UJSu1Mt/6u1pL+l0BBGGjTItCw K3PoIqA8zFWu0S7pkLAzkYwAJr6nk+FLpJYdJWPtX1zqemedzLYf8yTmKId9Q3Sl qcZNzg/0Vm2n4JFcn1muOuAzGrHxqLMdqOInz9luGMoppT45PvRnVS2tvoqpPw82 Ee0YWR524GdsegLZByxP =VCUE -----END PGP SIGNATURE-----