-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Wed, 6 Aug 2008 00:40:06 -0600 Source: user-mode-linux Binary: user-mode-linux Architecture: source i386 Version: 2.6.18-1um-2etch.22etch1 Distribution: stable-security Urgency: high Maintainer: User Mode Linux Maintainers <pkg-uml-pkgs@lists.alioth.debian.org> Changed-By: dann frazier <dannf@debian.org> Description: user-mode-linux - User-mode Linux (kernel) Closes: 410807 479773 Changes: user-mode-linux (2.6.18-1um-2etch.22etch1) stable-security; urgency=high . * Rebuild against linux-source-2.6.18_2.6.18.dfsg.1-22etch1: * bugfix/sctp-make-sure-n-sizeof-does-not-overflow.patch [SECURITY] Fix potential overflow condition in sctp_getsockopt_local_addrs_old See CVE-2008-2826 * bugfix/esp-iv-in-linear-part-of-skb.patch [SECURITY] Avoid tripping BUG() in IPsec code when the first fragment of an ESP packet does not contain the entire ESP header and IV See CVE-2007-6282 * bugfix/amd64-fix-zeroing-on-exception-in-copy_user.patch [SECURITY] [amd64] Fix potential information leak when a copy operation fails by properly zeroing out destination memory See CVE-2008-2729 * bugfix/tty-fix-for-tty-operations-bugs.patch [SECURITY] Fix issues with tty operation handling in various drivers See CVE-2008-2812 * bugfix/check-privileges-before-setting-mount-propagation.patch [SECURITY] Check CAP_SYS_ADMIN when changing mountpoint type See CVE-2008-2931 * bugfix/x86-fix-copy_user.patch [SECURITY][amd64] Fix memory leak in the copy_user routine, see #490910. See CVE-2008-0598 * Changes from 2.6.18.dfsg.1-22: * Merge in changes from 2.6.18.dfsg.1-18etch6 * 3w-9xxx: Add 3ware 9690SA Backport (closes: #479773) * Backport http://xenbits.xensource.com/xen-unstable.hg?rev/914304b3a3da, fixing kernel BUG at drivers/xen/core/evtchn.c:481 (closes: #410807). * Changes from 2.6.18.dfsg.1-18etch6 * bugfix/dccp-feature-length-check.patch [SECURITY] Validate feature length to avoid heap overflow See CVE-2008-2358 * bugfix/asn1-ber-decoding-checks.patch [SECURITY] Validate lengths in ASN.1 decoding code to avoid heap overflow See CVE-2008-1673 Files: 5cb0d6498fdb81826ae87ed1505d3617 892 misc extra user-mode-linux_2.6.18-1um-2etch.22etch1.dsc 03ca670996b8db498c46da96c6769b9a 17971 misc extra user-mode-linux_2.6.18-1um-2etch.22etch1.diff.gz 4bad5f3d2a7179063d0a7e696def9402 25590314 misc extra user-mode-linux_2.6.18-1um-2etch.22etch1_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFImU2chuANDBmkLRkRAq4FAJ4s1q9ehR7dnPQR6B67fII6pIYXYQCggC+Q lokeCWmRRKjMjzOclRHBElA= =GPb1 -----END PGP SIGNATURE----- Accepted: user-mode-linux_2.6.18-1um-2etch.22etch1.diff.gz to pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch1.diff.gz user-mode-linux_2.6.18-1um-2etch.22etch1.dsc to pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch1.dsc user-mode-linux_2.6.18-1um-2etch.22etch1_i386.deb to pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch1_i386.deb