Accepted kernel-source-2.6.8 2.6.8-16sarge6 (source all)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Mon, 4 Dec 2006 19:11:05 -0700
Source: kernel-source-2.6.8
Binary: kernel-source-2.6.8 kernel-doc-2.6.8 kernel-tree-2.6.8 kernel-patch-debian-2.6.8
Architecture: source all
Version: 2.6.8-16sarge6
Distribution: stable-security
Urgency: high
Maintainer: Debian kernel team <debian-kernel@lists.debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description:
kernel-doc-2.6.8 - Linux kernel specific documentation for version 2.6.8
kernel-patch-debian-2.6.8 - Debian patches to Linux 2.6.8
kernel-source-2.6.8 - Linux kernel source for version 2.6.8 with Debian patches
kernel-tree-2.6.8 - Linux kernel source tree for building Debian kernel images
Changes:
kernel-source-2.6.8 (2.6.8-16sarge6) stable-security; urgency=high
.
* perfmon-fd-refcnt.dpatch
[SECURITY][ia64] Fix file descriptor leak in perfmonctl
system call which could be used as a local denial of service attack
by depleting the system of file descriptors
See CVE-2006-3741
* ia64-sparc-cross-region-mappings.dpatch
[SECURITY] Prevent cross-region mappings on ia64 and sparc which
could be used in a local DoS attack (system crash)
See CVE-2006-4538
* __block_prepare_write-recovery.dpatch
[SECURITY] Fix an information leak in __block_prepare_write()
See CVE-2006-4813
* atm-clip-freed-skb-deref.dpatch
[SECURITY] Avoid dereferencing an already freed skb, preventing a
potential remote DoS (system crash) vector
See CVE-2006-4997
* ip6_flowlabel-lockup.dpatch
[SECURITY] Fix local DoS attack vector (lockups, oopses) in the
sequence handling for /proc/net/ip6_flowlabel
See CVE-2006-5619
* ppc-alignment-exception-table-check.dpatch
[SECURITY][ppc] Avoid potential DoS which can be triggered by some
futex ops
See CVE-2006-5649
* s390-uaccess-memleak.dpatch
[SECURITY][s390] Fix memory leak in copy_from_user by clearing the
remaining bytes of the kernel buffer after a fault on the userspace
address in copy_from_user()
See CVE-2006-5174
* smbfs-honor-mount-opts.dpatch
Honor uid, gid and mode mount options for smbfs even when unix extensions
are enabled
See CVE-2006-5871
* bridge-get_fdb_entries-overflow.dpatch
Protect against possible overflow in get_fdb_entries
See CVE-2006-5751
Files:
9e5b12cb1d4c98cddc88e5c36bf7d951 1002 devel optional kernel-source-2.6.8_2.6.8-16sarge6.dsc
1d83d174a3b2f5e6b03bcbf53c4d877f 1067572 devel optional kernel-source-2.6.8_2.6.8-16sarge6.diff.gz
3156984be3fc859f717a4253bd0ea462 1116726 devel optional kernel-patch-debian-2.6.8_2.6.8-16sarge6_all.deb
4b4ecbf67cb066043d0d9447b5238d28 34943318 devel optional kernel-source-2.6.8_2.6.8-16sarge6_all.deb
67ed3f0138673fdf06494239a3531972 36670 devel optional kernel-tree-2.6.8_2.6.8-16sarge6_all.deb
9c16bf9ab5f0ecf6551812f3e0e693ac 6192778 doc optional kernel-doc-2.6.8_2.6.8-16sarge6_all.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iD8DBQFFeD1ihuANDBmkLRkRApT4AJ9PF9bvJg0k4bqewXJy2YiaXjlvrwCdFkxh
d5PfuGnQwPk9BkwbXg13vyw=
=GkYB
-----END PGP SIGNATURE-----
Accepted:
kernel-doc-2.6.8_2.6.8-16sarge6_all.deb
to pool/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge6_all.deb
kernel-patch-debian-2.6.8_2.6.8-16sarge6_all.deb
to pool/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge6_all.deb
kernel-source-2.6.8_2.6.8-16sarge6.diff.gz
to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge6.diff.gz
kernel-source-2.6.8_2.6.8-16sarge6.dsc
to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge6.dsc
kernel-source-2.6.8_2.6.8-16sarge6_all.deb
to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge6_all.deb
kernel-tree-2.6.8_2.6.8-16sarge6_all.deb
to pool/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge6_all.deb