user-mode-linux 2.6.32-1um-4+48squeeze4 source package in Debian

Changelog

user-mode-linux (2.6.32-1um-4+48squeeze4) squeeze-security; urgency=high


  * Rebuild against linux-source-2.6.32 (2.6.32-48squeeze4):
    * drivers/cdrom/cdrom.c: use kzalloc() for failing hardware (CVE-2013-2164)
    * ipv6: ip6_sk_dst_check() must not assume ipv6 dst (CVE-2013-2232)	
    * af_key: fix info leaks in notify messages (CVE-2013-2234)
    * af_key: initialize satype in key_notify_policy_flush() (CVE-2013-2237)
    * block: do not pass disk names as format strings (CVE-2013-2851)
    * b43: stop format string leaking into error msgs (CVE-2013-2852)
    * sctp: Use correct sideffect command in duplicate cookie handling 
      (CVE-2013-2206)
    * kernel/signal.c: stop info leak via the tkill and the tgkill syscalls
      (CVE-2013-2141)
    * HID: validate HID report id size (CVE-2013-2888)
    * HID: check for NULL field when setting values
    * Information leak in openvz quota implementation (CVE-2013-2239)
    * HID: pantherlord: validate output report details (CVE-2013-2892)

 -- dann frazier <email address hidden>  Fri, 27 Sep 2013 16:29:32 -0600

Upload details

Uploaded by:
User Mode Linux Developers
Uploaded to:
Squeeze
Original maintainer:
User Mode Linux Developers
Architectures:
i386 amd64
Section:
kernel
Urgency:
Very Urgent

See full publishing history Publishing

Series Pocket Published Component Section

Builds

Downloads

File Size SHA-256 Checksum
user-mode-linux_2.6.32-1um-4+48squeeze4.dsc 2.0 KiB 395d482b3499306c47801ceee8cd97030ec642afb34b856f6d2b08638ebc8e24
user-mode-linux_2.6.32-1um.orig.tar.gz 19.7 KiB 027f61752e1fd4045e2b2a80b69e13da8670c54ebe7f04dccbb4a6fa94429243
user-mode-linux_2.6.32-1um-4+48squeeze4.diff.gz 24.8 KiB bf049f9569949eab422b546875f66a293d53afd31966a3ba8355ab50b03b19cb

No changes file available.

Binary packages built by this source