[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted kernel-image-2.6.8-i386 2.6.8-16sarge5 (source i386)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon,  4 Sep 2006 09:53:06 -0600
Source: kernel-image-2.6.8-i386
Binary: kernel-image-2.6.8-3-686 kernel-image-2.6.8-3-k7 kernel-headers-2.6.8-3-k7-smp kernel-image-2.6.8-3-686-smp kernel-image-2.6.8-3-k7-smp kernel-headers-2.6.8-3-k7 kernel-headers-2.6.8-3-686 kernel-image-2.6.8-3-386 kernel-headers-2.6.8-3-686-smp kernel-headers-2.6.8-3-386 kernel-headers-2.6.8-3
Architecture: source i386
Version: 2.6.8-16sarge5
Distribution: stable-security
Urgency: high
Maintainer: Debian kernel team <debian-kernel@lists.debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description: 
 kernel-headers-2.6.8-3 - Header files related to Linux kernel version 2.6.8
 kernel-headers-2.6.8-3-386 - Linux kernel headers 2.6.8 on 386
 kernel-headers-2.6.8-3-686 - Linux kernel headers 2.6.8 on PPro/Celeron/PII/PIII/P4
 kernel-headers-2.6.8-3-686-smp - Linux kernel headers 2.6.8 on PPro/Celeron/PII/PIII/P4 SMP
 kernel-headers-2.6.8-3-k7 - Linux kernel headers 2.6.8 on AMD K7
 kernel-headers-2.6.8-3-k7-smp - Linux kernel headers 2.6.8 on AMD K7 SMP
 kernel-image-2.6.8-3-386 - Linux kernel image for version 2.6.8 on 386.
 kernel-image-2.6.8-3-686 - Linux kernel image for version 2.6.8 on PPro/Celeron/PII/PIII/P4.
 kernel-image-2.6.8-3-686-smp - Linux kernel image for version 2.6.8 on PPro/Celeron/PII/PIII/P4 
 kernel-image-2.6.8-3-k7 - Linux kernel image for version 2.6.8 on AMD K7.
 kernel-image-2.6.8-3-k7-smp - Linux kernel image for version 2.6.8 on AMD K7 SMP.
Changes: 
 kernel-image-2.6.8-i386 (2.6.8-16sarge5) stable-security; urgency=high
 .
   * Build against kernel-tree-2.6.8-16sarge5:
     * [ERRATA] madvise_remove-restrict.dpatch
       [SECURITY] The 2.6.8-16sarge3 changelog associated this patch with
       CVE-2006-1524. However, this patch fixes an mprotect issue that was
       split off from the original report into CVE-2006-2071. 2.6.8 is not
       vulnerable to CVE-2006-1524 the madvise_remove issue.
       See CVE-2006-2071
     * fs-ext3-bad-nfs-handle.dpatch
       [SECURITY] James McKenzie discovered a Denial of Service vulnerability
       in the NFS driver. When exporting an ext3 file system over NFS, a remote
       attacker could exploit this to trigger a file system panic by sending
       a specially crafted UDP packet.
       See CVE-2006-3468
     * direct-io-write-mem-leak.dpatch
       [SECURITY] Fix memory leak in O_DIRECT write.
       See CVE-2004-2660
     * nfs-handle-long-symlinks.dpatch
       [SECURITY] Fix buffer overflow in NFS readline handling that allows a
       remote server to cause a denial of service (crash) via a long symlink
       See CVE-2005-4798
     * cdrom-bad-cgc.buflen-assign.dpatch
       [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially
       be used by a local user to trigger a buffer overflow via a specially
       crafted DVD, USB stick, or similar automatically mounted device.
       See CVE-2006-2935
     * usb-serial-ftdi_sio-dos.patch
       [SECURITY] fix userspace DoS in ftdi_sio driver
       See CVE-2006-2936
     * selinux-tracer-SID-fix.dpatch
       [SECURITY] Fix vulnerability in selinux_ptrace that prevents local
       users from changing the tracer SID to the SID of another process
       See CVE-2006-1052
     * netfilter-SO_ORIGINAL_DST-leak.dpatch
       [SECURITY] Fix information leak in SO_ORIGINAL_DST
       See CVE-2006-1343
     * sg-no-mmap-VM_IO.dpatch
       [SECURITY] Fix DoS vulnerability whereby a local user could attempt
       a dio/mmap and cause the sg driver to oops.
       See CVE-2006-1528
     * exit-bogus-bugon.dpatch
       [SECURITY] Remove bogus BUG() in exit.c which could be maliciously
       triggered by a local user
       See CVE-2006-1855
     * readv-writev-missing-lsm-check.dpatch,
       readv-writev-missing-lsm-check-compat.dpatch
       [SECURITY] Add missing file_permission callback in readv/writev syscalls
       See CVE-2006-1856
     * snmp-nat-mem-corruption-fix.dpatch
       [SECURITY] Fix memory corruption in snmp_trap_decode
       See CVE-2006-2444
     * kfree_skb-race.dpatch
       [SECURITY] Fix race between kfree_skb and __skb_unlink
       See CVE-2006-2446
     * hppa-mb-extraneous-semicolon.dpatch,
       sparc32-mb-extraneous-semicolons.dpatch,
       sparc64-mb-extraneous-semicolons.dpatch:
       Fix a syntax error caused by extranous semicolons in smp_mb() macros
       which resulted in a build failure with kfree_skb-race.dpatch
     * sctp-priv-elevation.dpatch
       [SECURITY] Fix SCTP privelege escalation
       See CVE-2006-3745
     * sctp-priv-elevation-2.dpatch
       [SECURITY] Fix local DoS resulting from sctp-priv-elevation.dpatch
       See CVE-2006-4535
     * ppc-hid0-dos.dpatch
       [SECURITY][ppc] Fix local DoS by clearing HID0 attention enable on
       PPC970 at boot time
       See CVE-2006-4093
     * udf-deadlock.dpatch
       [SECURITY] Fix possible UDF deadlock and memory corruption
       See CVE-2006-4145
Files: 
 108b890101a8cbe3a4cba4330775dddc 1047 devel optional kernel-image-2.6.8-i386_2.6.8-16sarge5.dsc
 0a1f8d61b3b360a899f311506a5ed479 91797 devel optional kernel-image-2.6.8-i386_2.6.8-16sarge5.tar.gz
 6cbcc15f94b986b2ece57101db195fbc 15384062 base optional kernel-image-2.6.8-3-686-smp_2.6.8-16sarge5_i386.deb
 88c40c053096833cee36f9e0d2fd2a37 2780616 devel optional kernel-headers-2.6.8-3_2.6.8-16sarge5_i386.deb
 5c464a4529417364dc7a9b0f900bbf90 257412 devel optional kernel-headers-2.6.8-3-686_2.6.8-16sarge5_i386.deb
 34e1f86815969d0622214cf91e214ea1 257586 devel optional kernel-headers-2.6.8-3-k7_2.6.8-16sarge5_i386.deb
 ac9cb9744cb60dd5038aca92254a8499 254796 devel optional kernel-headers-2.6.8-3-k7-smp_2.6.8-16sarge5_i386.deb
 a6516c9058aadfbcf924c9fba2092ffe 259552 devel optional kernel-headers-2.6.8-3-386_2.6.8-16sarge5_i386.deb
 a037ecae10f6459f542966e042895452 254580 devel optional kernel-headers-2.6.8-3-686-smp_2.6.8-16sarge5_i386.deb
 25f84f36f5583bc65f7996c17ac27bfb 15162058 base optional kernel-image-2.6.8-3-k7-smp_2.6.8-16sarge5_i386.deb
 7ded56e75941f998756b3f6711c4021e 14066300 base optional kernel-image-2.6.8-3-386_2.6.8-16sarge5_i386.deb
 b0648b5e62974dd803214b7633b468b9 15549728 base optional kernel-image-2.6.8-3-686_2.6.8-16sarge5_i386.deb
 98db653b59db10b9126600d9408c00ca 15271760 base optional kernel-image-2.6.8-3-k7_2.6.8-16sarge5_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFDt3yhuANDBmkLRkRAi/OAKCPpktuEIIVxF3Kk0kbcXel+Z3xagCggFfJ
mscabkiD12iub/X8cJpAFZ0=
=F1d1
-----END PGP SIGNATURE-----


Accepted:
kernel-headers-2.6.8-3-386_2.6.8-16sarge5_i386.deb
  to pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-386_2.6.8-16sarge5_i386.deb
kernel-headers-2.6.8-3-686-smp_2.6.8-16sarge5_i386.deb
  to pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686-smp_2.6.8-16sarge5_i386.deb
kernel-headers-2.6.8-3-686_2.6.8-16sarge5_i386.deb
  to pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686_2.6.8-16sarge5_i386.deb
kernel-headers-2.6.8-3-k7-smp_2.6.8-16sarge5_i386.deb
  to pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7-smp_2.6.8-16sarge5_i386.deb
kernel-headers-2.6.8-3-k7_2.6.8-16sarge5_i386.deb
  to pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7_2.6.8-16sarge5_i386.deb
kernel-headers-2.6.8-3_2.6.8-16sarge5_i386.deb
  to pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3_2.6.8-16sarge5_i386.deb
kernel-image-2.6.8-3-386_2.6.8-16sarge5_i386.deb
  to pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-386_2.6.8-16sarge5_i386.deb
kernel-image-2.6.8-3-686-smp_2.6.8-16sarge5_i386.deb
  to pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686-smp_2.6.8-16sarge5_i386.deb
kernel-image-2.6.8-3-686_2.6.8-16sarge5_i386.deb
  to pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686_2.6.8-16sarge5_i386.deb
kernel-image-2.6.8-3-k7-smp_2.6.8-16sarge5_i386.deb
  to pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7-smp_2.6.8-16sarge5_i386.deb
kernel-image-2.6.8-3-k7_2.6.8-16sarge5_i386.deb
  to pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7_2.6.8-16sarge5_i386.deb
kernel-image-2.6.8-i386_2.6.8-16sarge5.dsc
  to pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge5.dsc
kernel-image-2.6.8-i386_2.6.8-16sarge5.tar.gz
  to pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge5.tar.gz



Reply to: