Back to user-mode-linux PTS page

Accepted user-mode-linux 2.6.26-1um-2+26lenny3 (source amd64)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sat, 18 Jun 2011 13:30:40 -0600
Source: user-mode-linux
Binary: user-mode-linux
Architecture: source amd64
Version: 2.6.26-1um-2+26lenny3
Distribution: oldstable-security
Urgency: high
Maintainer: User Mode Linux Maintainers <pkg-uml-pkgs@lists.alioth.debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description: 
 user-mode-linux - User-mode Linux (kernel)
Changes: 
 user-mode-linux (2.6.26-1um-2+26lenny3) oldstable-security; urgency=high
 .
   * Rebuild against linux-source-2.6.26 (2.6.26-26lenny3):
     * net: clear heap allocations for privileged ethtool actions (CVE-2010-4655)
     * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1
       (CVE-2011-0711)
     * [s390] remove task_show_regs (CVE-2011-0710)
     * fs/partitions: Validate map_count in Mac partition tables (CVE-2011-1010)
     * ldm: corrupted partition table can cause kernel oops (CVE-2011-1012)
     * Bluetooth: sco: fix information leak to userspace (CVE-2011-1078)
     * Bluetooth: bnep: fix buffer overflow (CVE-2011-1079)
     * bridge: netfilter: fix information leak (CVE-2011-1080)
     * nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab
       (CVE-2011-1090)
     * dccp: fix oops on Reset after close (CVE-2011-1093)
     * Fix corrupted OSF partition table parsing (CVE-2011-1163)
     * netfilter: arp_tables: fix infoleak to userspace (CVE-2011-1170)
     * netfilter: ip_tables: fix infoleak to userspace (CVE-2011-1171)
     * ipv6: netfilter: ip6_tables: fix infoleak to userspace (CVE-2011-1172)
     * econet: 4 byte infoleak to the network (CVE-2011-1173)
     * irda: validate peer name and attribute lengths (CVE-2011-1180)
     * RDMA/cma: Fix crash in request handlers (CVE-2011-0695)
     * IB/cm: Bump reference count on cm_id before invoking callback
       (CVE-2011-0695)
     * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal
       code (CVE-2011-1182)
     * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo
       (CVE-2011-1182)
     * proc: protect mm start_code/end_code in /proc/pid/stat (CVE-2011-0726)
     * cifs: Fix cache stuffing issue in the dns_resolver keyring (CVE-2010-2524)
     * serial: Fix information leak in TIOCGICOUNT ioctl (CVE-2010-4075)
     * net: ax25: improve information leak to userland fix, a further fix
       for CVE-2010-3875
     * char/tpm: Fix unitialized usage of data buffer (CVE-2011-1160)
     * ROSE: prevent heap corruption with bad facilities (CVE-2011-1493)
     * next_pidmap: fix overflow condition (CVE-2011-1593)
     * can: Add missing socket check in can/bcm release (CVE-2011-1598)
     * agp: fix arbitrary kernel memory writes (CVE-2011-1745, CVE-2011-2022)
     * agp: fix OOM and buffer overflow (CVE-2011-1746)
     * can: Add missing socket check in can/raw release (CVE-2011-1748)
     * [arm] 6891/1: prevent heap corruption in OABI semtimedop (CVE-2011-1759)
     * gre: fix netns vs proto registration ordering (CVE-2011-1767)
     * Validate size of EFI GUID partition entries (CVE-2011-1776)
     * fs/partitions/ldm.c: fix oops caused by corrupted partition table
       (CVE-2011-1017)
     * Improve fix for buffer overflow in ldm_frag_add (CVE-2011-2182)
     * efi: corrupted GUID partition tables can cause kernel oops (CVE-2011-1577)
     * tunnels: fix netns vs proto registration ordering
Checksums-Sha1: 
 1812c80f119793ba2c73f0c9a56d8ee189068ef8 1919 user-mode-linux_2.6.26-1um-2+26lenny3.dsc
 da0f2ad384c0b475256c810b6bde52cb14466624 22037 user-mode-linux_2.6.26-1um-2+26lenny3.diff.gz
 5d139bde26a5c0ba9e361500bc749fa46a720d9c 5847678 user-mode-linux_2.6.26-1um-2+26lenny3_amd64.deb
Checksums-Sha256: 
 754c510a02a1d5579ba692658df2c197ea97296dfb7bcc4e7fcb9ddf9fead59a 1919 user-mode-linux_2.6.26-1um-2+26lenny3.dsc
 9c3f2772146dba124d239ccf5b28e0e12831bf6f0bdae9694e7604184321a37d 22037 user-mode-linux_2.6.26-1um-2+26lenny3.diff.gz
 82a61afdd56c66a0adc8eb16bbd84b8b1ef9190ef870207a01d96d1a935ac9d1 5847678 user-mode-linux_2.6.26-1um-2+26lenny3_amd64.deb
Files: 
 46dfbaf06ef3b9591959bbdacb4f0ee2 1919 misc extra user-mode-linux_2.6.26-1um-2+26lenny3.dsc
 fd3cb316f161b9c3929a0d260a801fea 22037 misc extra user-mode-linux_2.6.26-1um-2+26lenny3.diff.gz
 4b36e9080f284304c91256c9586d37ae 5847678 misc extra user-mode-linux_2.6.26-1um-2+26lenny3_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=oLZ3
-----END PGP SIGNATURE-----


Accepted:
user-mode-linux_2.6.26-1um-2+26lenny3.diff.gz
  to main/u/user-mode-linux/user-mode-linux_2.6.26-1um-2+26lenny3.diff.gz
user-mode-linux_2.6.26-1um-2+26lenny3.dsc
  to main/u/user-mode-linux/user-mode-linux_2.6.26-1um-2+26lenny3.dsc
user-mode-linux_2.6.26-1um-2+26lenny3_amd64.deb
  to main/u/user-mode-linux/user-mode-linux_2.6.26-1um-2+26lenny3_amd64.deb