-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Thu, 24 Apr 2014 17:56:13 -0600 Source: user-mode-linux Binary: user-mode-linux Architecture: source amd64 Version: 2.6.32-1um-4+48squeeze5 Distribution: squeeze-security Urgency: high Maintainer: User Mode Linux Maintainers <pkg-uml-pkgs@lists.alioth.debian.org> Changed-By: dann frazier <dannf@debian.org> Description: user-mode-linux - User-mode Linux (kernel) Closes: 740041 Changes: user-mode-linux (2.6.32-1um-4+48squeeze5) squeeze-security; urgency=high . * Rebuild against linux-source-2.6.32 (2.6.32-48squeeze5): * cciss: fix info leak in cciss_ioctl32_passthru() (CVE-2013-2147) * cpqarray: fix info leak in ida_locked_ioctl() (CVE-2013-2147) * HID: LG: validate HID output report details (CVE-2013-2893) * HID: zeroplus: validate output report details (CVE-2013-2889) * HID: provide a helper for validating hid reports (required by (CVE-2013-2889 and CVE-2013-2893) * ipv6: handling of temporary addresses (CVE-2013-0343) * ipv6: panic with UDP_CORK sockets (CVE-2013-4162) * dm snapshot: fix data corruption (CVE-2013-4299) * crypto: ansi_cprng - Fix off by one error in non-block size request (CVE-2013-4345) * uio: privilege escalation (CVE-2013-4511) * uml: check length in exitcode_proc_write() (CVE-2013-4512) * KVM: Validate VCPU parameter (CVE-2013-4587) * ipvs: Add boundary check on ioctl arguments (CVE-2013-4588) * aacraid: prevent invalid pointer dereference (CVE-2013-6380) * qeth: avoid buffer overflow in snmp ioctl (CVE-2013-6381) * aacraid: missing capable() check in compat ioctl (CVE-2013-6383) * Various socket leaks (Initially CVE-2013-6405, later split into CVE-2013-7263, CVE-2013-7264 and CVE-2013-7265) * xen-netfront: reduce gso_max_size to account for max TCP header (Closes: #740041) * exec/ptrace: fix get_dumpable() incorrect tests (CVE-2103-2929) * KVM: x86: Fix potential divide by 0 in lapic (CVE-2013-6367) * xfs: underflow bug in xfs_attrlist_by_handle() (CVE-2013-6382) * farsync: fix info leak in ioctl (CVE-2014-1444) * wanxl: fix info leak in ioctl (CVE-2014-1445) * hamradio/yam: fix info leak in ioctl (CVE-2014-1446) * net: sctp: fix sctp_sf_do_5_1D_ce to verify if we/peer is AUTH capable (CVE-2014-0101) * SELinux: Fix kernel BUG on empty security contexts (CVE-2014-1874) * s390: fix kernel crash due to linkage stack instructions (CVE-2014-2039) * netfilter: nf_conntrack_dccp: fix skb_header_pointer API usages (CVE-2014-2523) * rds: prevent dereference of a NULL device (CVE-2013-7339) Checksums-Sha1: ae600f9404d8cc7da994f6abfa5a685a9d43dbe6 2053 user-mode-linux_2.6.32-1um-4+48squeeze5.dsc 8b49c2a391e14d0ebd7fa44c35cbc98100378fef 26276 user-mode-linux_2.6.32-1um-4+48squeeze5.diff.gz c60b2eb304e9e0d042d70364e3d1e50bd72625b3 7087346 user-mode-linux_2.6.32-1um-4+48squeeze5_amd64.deb Checksums-Sha256: ff05a3bac0f0e0b50e9f2ba64fcfc09d8f3540f8035ce4a564dfc9543d1ff601 2053 user-mode-linux_2.6.32-1um-4+48squeeze5.dsc a03cd9dbe1fa0f4d6012435d3fceeb63a3b8e152b2f5e545d4eba2cc3ad65676 26276 user-mode-linux_2.6.32-1um-4+48squeeze5.diff.gz 0c36a0de35ba39d7884b5c234d2dd36b0cf585d5134149995e6e620ee3090b70 7087346 user-mode-linux_2.6.32-1um-4+48squeeze5_amd64.deb Files: 17d04d52fd70fb5b76b102024328b1fb 2053 kernel extra user-mode-linux_2.6.32-1um-4+48squeeze5.dsc 6e6c06811b611dd92549d0ef0caeeda3 26276 kernel extra user-mode-linux_2.6.32-1um-4+48squeeze5.diff.gz 1fa06189c0c5635ed4b887222b2a421c 7087346 kernel extra user-mode-linux_2.6.32-1um-4+48squeeze5_amd64.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJTWeXQAAoJEBv4PF5U/IZACQgQAIFHw/D2fy4xn3e1iz5HcBuJ JLYPPzX6cRXfx3D9TqwGOtj7NsqcV21yDarUdQvH1I0UL+MipxLWILAT52Bg7WvW Rq/lcOFy3vOlg7o/RgeaEAH++ZCgEUmcgld1cvjp86e8OexkCPqscvNIIpCulwEU 8tOJdpx70E2IZJsBElZnFl7zmzPnf45PL9N/wD7TW8YrZuF4YEuSt7glM+VzmzgK PmiPUKfjR8/Xy1vPCU9uEK5gITIbK9+UIjS1N/uvl4c3T+FjfjaHz2mDZ0gRhgkp S9JRUkHzYUKSNH50WU+Pwgc+NrSBsauiWraNxmNZzZwnYUh7IaJ8jW0koGskD/oP 4o0k8RGG7iEJGLej54h7IGB4gseOOGjcDZHTZGNr24a5LbBSIw/69HCeAyhpxlRU YuDd1vcjOrgD4ppjAXRkbZhlWceOdNGPgwKdluzPA3Ab0OKASZUOp0VIr39BfbMP +s0kBbUY976zFU95mRGpcO6yuWNqPE3/MofFzssLAh0SS+kz3mtR82O+a6HZh6Wo rp6iiGtzlDzhwdCCS4OI3zcW0/Myu7YkuNq3moY/ODHztQi79utQVmq5PoHhXp1e pGCF5/AfmREadtwdB1FCvLHC9265ebj2/FzSwFQHcCB58ZfF1kVs7oSL2uwDuQex EgLrUPiSIgg7JlJCnQXZ =qy8G -----END PGP SIGNATURE-----