-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Sat, 18 Jun 2011 13:30:40 -0600 Source: user-mode-linux Binary: user-mode-linux Architecture: source amd64 Version: 2.6.26-1um-2+26lenny3 Distribution: oldstable-security Urgency: high Maintainer: User Mode Linux Maintainers Changed-By: dann frazier Description: user-mode-linux - User-mode Linux (kernel) Changes: user-mode-linux (2.6.26-1um-2+26lenny3) oldstable-security; urgency=high . * Rebuild against linux-source-2.6.26 (2.6.26-26lenny3): * net: clear heap allocations for privileged ethtool actions (CVE-2010-4655) * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1 (CVE-2011-0711) * [s390] remove task_show_regs (CVE-2011-0710) * fs/partitions: Validate map_count in Mac partition tables (CVE-2011-1010) * ldm: corrupted partition table can cause kernel oops (CVE-2011-1012) * Bluetooth: sco: fix information leak to userspace (CVE-2011-1078) * Bluetooth: bnep: fix buffer overflow (CVE-2011-1079) * bridge: netfilter: fix information leak (CVE-2011-1080) * nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab (CVE-2011-1090) * dccp: fix oops on Reset after close (CVE-2011-1093) * Fix corrupted OSF partition table parsing (CVE-2011-1163) * netfilter: arp_tables: fix infoleak to userspace (CVE-2011-1170) * netfilter: ip_tables: fix infoleak to userspace (CVE-2011-1171) * ipv6: netfilter: ip6_tables: fix infoleak to userspace (CVE-2011-1172) * econet: 4 byte infoleak to the network (CVE-2011-1173) * irda: validate peer name and attribute lengths (CVE-2011-1180) * RDMA/cma: Fix crash in request handlers (CVE-2011-0695) * IB/cm: Bump reference count on cm_id before invoking callback (CVE-2011-0695) * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code (CVE-2011-1182) * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo (CVE-2011-1182) * proc: protect mm start_code/end_code in /proc/pid/stat (CVE-2011-0726) * cifs: Fix cache stuffing issue in the dns_resolver keyring (CVE-2010-2524) * serial: Fix information leak in TIOCGICOUNT ioctl (CVE-2010-4075) * net: ax25: improve information leak to userland fix, a further fix for CVE-2010-3875 * char/tpm: Fix unitialized usage of data buffer (CVE-2011-1160) * ROSE: prevent heap corruption with bad facilities (CVE-2011-1493) * next_pidmap: fix overflow condition (CVE-2011-1593) * can: Add missing socket check in can/bcm release (CVE-2011-1598) * agp: fix arbitrary kernel memory writes (CVE-2011-1745, CVE-2011-2022) * agp: fix OOM and buffer overflow (CVE-2011-1746) * can: Add missing socket check in can/raw release (CVE-2011-1748) * [arm] 6891/1: prevent heap corruption in OABI semtimedop (CVE-2011-1759) * gre: fix netns vs proto registration ordering (CVE-2011-1767) * Validate size of EFI GUID partition entries (CVE-2011-1776) * fs/partitions/ldm.c: fix oops caused by corrupted partition table (CVE-2011-1017) * Improve fix for buffer overflow in ldm_frag_add (CVE-2011-2182) * efi: corrupted GUID partition tables can cause kernel oops (CVE-2011-1577) * tunnels: fix netns vs proto registration ordering Checksums-Sha1: 1812c80f119793ba2c73f0c9a56d8ee189068ef8 1919 user-mode-linux_2.6.26-1um-2+26lenny3.dsc da0f2ad384c0b475256c810b6bde52cb14466624 22037 user-mode-linux_2.6.26-1um-2+26lenny3.diff.gz 5d139bde26a5c0ba9e361500bc749fa46a720d9c 5847678 user-mode-linux_2.6.26-1um-2+26lenny3_amd64.deb Checksums-Sha256: 754c510a02a1d5579ba692658df2c197ea97296dfb7bcc4e7fcb9ddf9fead59a 1919 user-mode-linux_2.6.26-1um-2+26lenny3.dsc 9c3f2772146dba124d239ccf5b28e0e12831bf6f0bdae9694e7604184321a37d 22037 user-mode-linux_2.6.26-1um-2+26lenny3.diff.gz 82a61afdd56c66a0adc8eb16bbd84b8b1ef9190ef870207a01d96d1a935ac9d1 5847678 user-mode-linux_2.6.26-1um-2+26lenny3_amd64.deb Files: 46dfbaf06ef3b9591959bbdacb4f0ee2 1919 misc extra user-mode-linux_2.6.26-1um-2+26lenny3.dsc fd3cb316f161b9c3929a0d260a801fea 22037 misc extra user-mode-linux_2.6.26-1um-2+26lenny3.diff.gz 4b36e9080f284304c91256c9586d37ae 5847678 misc extra user-mode-linux_2.6.26-1um-2+26lenny3_amd64.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iQIcBAEBAgAGBQJN/UNjAAoJEBv4PF5U/IZAygYP/2Cleg+Y1PUqPFRhxQSAh6at /wn03BUbuD74tUJ0h8sjq3EvY8xef/te7ZWjvIwYphQEZ3ulehQ2nH0OVGYP23yg NIkA2oz8H2xdncrP8DRUHbjsPeTrjYv8u9Cf6Cb1afMJCyZ7HZMK/EAH+8hNbIfb d4SW2DC1aKveKcnqY9tprMHMavF+rhJmqnfdhs2+VUi1auQhqwa/XVka9ZCVhy5l +1D5Glw+3wJtY+SR4ZL5JJ10Czp9X1x6tDtM2K6uD2GC99gv+yZEjxa+XBPkvobA bA3uHogaphhDkUyHc0Jfbhi0fXftrUMb+ADnrlMy+bVO55KTVjphR5LVjPVKEtGd P3WIKSGi7IK8l3dyqCyP9SeuBq6iHju7LBDj2xVxhfVWl8ttfvo5DnfZp04brDbj TfITnPwwE1SlBwwKlJ11rWi6rxwATuGejpzT4e3bRcCyvXC03F/sxfxUSacJKfLo E4L46AoGYKRLt8kuoWK7crBGBjmyvLu+MJkEAZ7lgyQ4QvnxgRQk7ZSalNajEfqW qLFOf/cKlAI19A+WvaNo+R1P02Ik+uFZg1V/8VI3CsFNLswARzvb8ksVUn7jiZdu 2dgNBWiFEUj9qxiIAAvZ2GCbHRSV2452ZQfoUoNHuzUp4DYBefTRlqVX2U+BvpwW uWZT+0SygAt4MVD97Y9m =oLZ3 -----END PGP SIGNATURE-----