Accepted user-mode-linux 2.6.26-1um-2+26lenny3 (source amd64)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Sat, 18 Jun 2011 13:30:40 -0600
Source: user-mode-linux
Binary: user-mode-linux
Architecture: source amd64
Version: 2.6.26-1um-2+26lenny3
Distribution: oldstable-security
Urgency: high
Maintainer: User Mode Linux Maintainers <pkg-uml-pkgs@lists.alioth.debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description:
user-mode-linux - User-mode Linux (kernel)
Changes:
user-mode-linux (2.6.26-1um-2+26lenny3) oldstable-security; urgency=high
.
* Rebuild against linux-source-2.6.26 (2.6.26-26lenny3):
* net: clear heap allocations for privileged ethtool actions (CVE-2010-4655)
* xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1
(CVE-2011-0711)
* [s390] remove task_show_regs (CVE-2011-0710)
* fs/partitions: Validate map_count in Mac partition tables (CVE-2011-1010)
* ldm: corrupted partition table can cause kernel oops (CVE-2011-1012)
* Bluetooth: sco: fix information leak to userspace (CVE-2011-1078)
* Bluetooth: bnep: fix buffer overflow (CVE-2011-1079)
* bridge: netfilter: fix information leak (CVE-2011-1080)
* nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab
(CVE-2011-1090)
* dccp: fix oops on Reset after close (CVE-2011-1093)
* Fix corrupted OSF partition table parsing (CVE-2011-1163)
* netfilter: arp_tables: fix infoleak to userspace (CVE-2011-1170)
* netfilter: ip_tables: fix infoleak to userspace (CVE-2011-1171)
* ipv6: netfilter: ip6_tables: fix infoleak to userspace (CVE-2011-1172)
* econet: 4 byte infoleak to the network (CVE-2011-1173)
* irda: validate peer name and attribute lengths (CVE-2011-1180)
* RDMA/cma: Fix crash in request handlers (CVE-2011-0695)
* IB/cm: Bump reference count on cm_id before invoking callback
(CVE-2011-0695)
* Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal
code (CVE-2011-1182)
* Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo
(CVE-2011-1182)
* proc: protect mm start_code/end_code in /proc/pid/stat (CVE-2011-0726)
* cifs: Fix cache stuffing issue in the dns_resolver keyring (CVE-2010-2524)
* serial: Fix information leak in TIOCGICOUNT ioctl (CVE-2010-4075)
* net: ax25: improve information leak to userland fix, a further fix
for CVE-2010-3875
* char/tpm: Fix unitialized usage of data buffer (CVE-2011-1160)
* ROSE: prevent heap corruption with bad facilities (CVE-2011-1493)
* next_pidmap: fix overflow condition (CVE-2011-1593)
* can: Add missing socket check in can/bcm release (CVE-2011-1598)
* agp: fix arbitrary kernel memory writes (CVE-2011-1745, CVE-2011-2022)
* agp: fix OOM and buffer overflow (CVE-2011-1746)
* can: Add missing socket check in can/raw release (CVE-2011-1748)
* [arm] 6891/1: prevent heap corruption in OABI semtimedop (CVE-2011-1759)
* gre: fix netns vs proto registration ordering (CVE-2011-1767)
* Validate size of EFI GUID partition entries (CVE-2011-1776)
* fs/partitions/ldm.c: fix oops caused by corrupted partition table
(CVE-2011-1017)
* Improve fix for buffer overflow in ldm_frag_add (CVE-2011-2182)
* efi: corrupted GUID partition tables can cause kernel oops (CVE-2011-1577)
* tunnels: fix netns vs proto registration ordering
Checksums-Sha1:
1812c80f119793ba2c73f0c9a56d8ee189068ef8 1919 user-mode-linux_2.6.26-1um-2+26lenny3.dsc
da0f2ad384c0b475256c810b6bde52cb14466624 22037 user-mode-linux_2.6.26-1um-2+26lenny3.diff.gz
5d139bde26a5c0ba9e361500bc749fa46a720d9c 5847678 user-mode-linux_2.6.26-1um-2+26lenny3_amd64.deb
Checksums-Sha256:
754c510a02a1d5579ba692658df2c197ea97296dfb7bcc4e7fcb9ddf9fead59a 1919 user-mode-linux_2.6.26-1um-2+26lenny3.dsc
9c3f2772146dba124d239ccf5b28e0e12831bf6f0bdae9694e7604184321a37d 22037 user-mode-linux_2.6.26-1um-2+26lenny3.diff.gz
82a61afdd56c66a0adc8eb16bbd84b8b1ef9190ef870207a01d96d1a935ac9d1 5847678 user-mode-linux_2.6.26-1um-2+26lenny3_amd64.deb
Files:
46dfbaf06ef3b9591959bbdacb4f0ee2 1919 misc extra user-mode-linux_2.6.26-1um-2+26lenny3.dsc
fd3cb316f161b9c3929a0d260a801fea 22037 misc extra user-mode-linux_2.6.26-1um-2+26lenny3.diff.gz
4b36e9080f284304c91256c9586d37ae 5847678 misc extra user-mode-linux_2.6.26-1um-2+26lenny3_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)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=oLZ3
-----END PGP SIGNATURE-----
Accepted:
user-mode-linux_2.6.26-1um-2+26lenny3.diff.gz
to main/u/user-mode-linux/user-mode-linux_2.6.26-1um-2+26lenny3.diff.gz
user-mode-linux_2.6.26-1um-2+26lenny3.dsc
to main/u/user-mode-linux/user-mode-linux_2.6.26-1um-2+26lenny3.dsc
user-mode-linux_2.6.26-1um-2+26lenny3_amd64.deb
to main/u/user-mode-linux/user-mode-linux_2.6.26-1um-2+26lenny3_amd64.deb
Reply to: