[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted kernel-image-2.6.8-s390 2.6.8-5sarge6 (s390 all source)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue,  5 Dec 2006 02:21:43 -0700
Source: kernel-image-2.6.8-s390
Binary: kernel-image-2.6.8-3-s390x kernel-patch-2.6.8-s390 kernel-image-2.6.8-3-s390-tape kernel-headers-2.6.8-3 kernel-image-2.6.8-3-s390
Architecture: all s390 source 
Version: 2.6.8-5sarge6
Distribution: stable-security
Urgency: high
Maintainer: Debian kernel team <debian-kernel@lists.debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description: 
 kernel-headers-2.6.8-3 - Header files related to Linux kernel version 2.6.8 on IBM S/390
 kernel-image-2.6.8-3-s390 - Linux kernel image for kernel version 2.6.8 on IBM S/390
 kernel-image-2.6.8-3-s390-tape - Linux kernel image for kernel version 2.6.8 on IBM S/390
 kernel-image-2.6.8-3-s390x - Linux kernel image for kernel version 2.6.8 on IBM zSeries.
 kernel-patch-2.6.8-s390 - Diffs to the Linux kernel source 2.6.8 for IBM S/390 and zSeries
Changes: 
 kernel-image-2.6.8-s390 (2.6.8-5sarge6) stable-security; urgency=high
 .
   * Build against kernel-tree-2.6.8-16sarge6:
     * perfmon-fd-refcnt.dpatch
       [SECURITY][ia64] Fix file descriptor leak in perfmonctl
       system call which could be used as a local denial of service attack
       by depleting the system of file descriptors
       See CVE-2006-3741
     * ia64-sparc-cross-region-mappings.dpatch
       [SECURITY] Prevent cross-region mappings on ia64 and sparc which
       could be used in a local DoS attack (system crash)
       See CVE-2006-4538
     * __block_prepare_write-recovery.dpatch
       [SECURITY] Fix an information leak in __block_prepare_write()
       See CVE-2006-4813
     * atm-clip-freed-skb-deref.dpatch
       [SECURITY] Avoid dereferencing an already freed skb, preventing a
       potential remote DoS (system crash) vector
       See CVE-2006-4997
     * ip6_flowlabel-lockup.dpatch
       [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
       sequence handling for /proc/net/ip6_flowlabel
       See CVE-2006-5619
     * ppc-alignment-exception-table-check.dpatch
       [SECURITY][ppc] Avoid potential DoS which can be triggered by some
       futex ops
       See CVE-2006-5649
     * s390-uaccess-memleak.dpatch
       [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
       remaining bytes of the kernel buffer after a fault on the userspace
       address in copy_from_user()
       See CVE-2006-5174
     * smbfs-honor-mount-opts.dpatch
       Honor uid, gid and mode mount options for smbfs even when unix extensions
       are enabled
       See CVE-2006-5871
     * bridge-get_fdb_entries-overflow.dpatch
       Protect against possible overflow in get_fdb_entries
       See CVE-2006-5751
Files: 
 359e3d309b037d46ea347dfa221b06fc 846 devel optional kernel-image-2.6.8-s390_2.6.8-5sarge6.dsc
 3761b55bbeebbb0f95ead41ed1c63645 3190572 base optional kernel-image-2.6.8-3-s390x_2.6.8-5sarge6_s390.deb
 482b528f209c1c2cae844c28d6b18ae3 12640 devel optional kernel-patch-2.6.8-s390_2.6.8-5sarge6_all.deb
 67913b4030c03602ab7b995e18a61ff0 5088210 devel optional kernel-headers-2.6.8-3_2.6.8-5sarge6_s390.deb
 b9fade60d70a3149dfb975f46fa24876 14602 devel optional kernel-image-2.6.8-s390_2.6.8-5sarge6.tar.gz
 c985c3054acf6d23de65e2b1e8abceb1 1145348 base extra kernel-image-2.6.8-3-s390-tape_2.6.8-5sarge6_s390.deb
 f075548343f44a55fa86950ab1acfd4e 2983156 base optional kernel-image-2.6.8-3-s390_2.6.8-5sarge6_s390.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFeE8rhuANDBmkLRkRAhseAJ9W0SRC0UI4Jv188FNBY1pjCdOSFgCeM7F/
dBipdocG1IN4eaelec1eV1U=
=D291
-----END PGP SIGNATURE-----


Accepted:
kernel-headers-2.6.8-3_2.6.8-5sarge6_s390.deb
  to pool/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-3_2.6.8-5sarge6_s390.deb
kernel-image-2.6.8-3-s390-tape_2.6.8-5sarge6_s390.deb
  to pool/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390-tape_2.6.8-5sarge6_s390.deb
kernel-image-2.6.8-3-s390_2.6.8-5sarge6_s390.deb
  to pool/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390_2.6.8-5sarge6_s390.deb
kernel-image-2.6.8-3-s390x_2.6.8-5sarge6_s390.deb
  to pool/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390x_2.6.8-5sarge6_s390.deb
kernel-image-2.6.8-s390_2.6.8-5sarge6.dsc
  to pool/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge6.dsc
kernel-image-2.6.8-s390_2.6.8-5sarge6.tar.gz
  to pool/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge6.tar.gz
kernel-patch-2.6.8-s390_2.6.8-5sarge6_all.deb
  to pool/main/k/kernel-image-2.6.8-s390/kernel-patch-2.6.8-s390_2.6.8-5sarge6_all.deb



Reply to: