Accepted kernel-image-2.6.8-hppa 2.6.8-6sarge6 (source hppa)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Tue, 5 Dec 2006 21:40:55 -0700
Source: kernel-image-2.6.8-hppa
Binary: kernel-headers-2.6.8-3-32 kernel-image-2.6.8-3-32 kernel-image-2.6.8-3-64-smp kernel-image-2.6.8-3-64 kernel-headers-2.6.8-3-64-smp kernel-image-2.6.8-3-32-smp kernel-headers-2.6.8-3-32-smp kernel-headers-2.6.8-3 kernel-headers-2.6.8-3-64
Architecture: hppa source
Version: 2.6.8-6sarge6
Distribution: stable-security
Urgency: high
Maintainer: Kyle McMartin <kyle@debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description:
kernel-headers-2.6.8-3 - Header files for the Linux kernel version 2.6.8
kernel-headers-2.6.8-3-32 - Linux kernel headers 2.6.8 on HP PA-RISC 32-bit systems
kernel-headers-2.6.8-3-32-smp - Linux kernel headers 2.6.8 on HP PA-RISC 32-bit systems
kernel-headers-2.6.8-3-64 - Linux kernel headers 2.6.8 on HP PA-RISC 64-bit systems
kernel-headers-2.6.8-3-64-smp - Linux kernel headers 2.6.8 on HP PA-RISC 64-bit systems
kernel-image-2.6.8-3-32 - Linux kernel image for version 2.6.8 on 32-bit PA-RISC
kernel-image-2.6.8-3-32-smp - Linux kernel image for version 2.6.8 on 32-bit PA-RISC
kernel-image-2.6.8-3-64 - Linux kernel image for version 2.6.8 on 64-bit PA-RISC
kernel-image-2.6.8-3-64-smp - Linux kernel image for version 2.6.8 on 64-bit PA-RISC
Changes:
kernel-image-2.6.8-hppa (2.6.8-6sarge6) stable-security; urgency=high
.
* Build against kernel-tree-2.6.8-16sarge6:
* perfmon-fd-refcnt.dpatch
[SECURITY][ia64] Fix file descriptor leak in perfmonctl
system call which could be used as a local denial of service attack
by depleting the system of file descriptors
See CVE-2006-3741
* ia64-sparc-cross-region-mappings.dpatch
[SECURITY] Prevent cross-region mappings on ia64 and sparc which
could be used in a local DoS attack (system crash)
See CVE-2006-4538
* __block_prepare_write-recovery.dpatch
[SECURITY] Fix an information leak in __block_prepare_write()
See CVE-2006-4813
* atm-clip-freed-skb-deref.dpatch
[SECURITY] Avoid dereferencing an already freed skb, preventing a
potential remote DoS (system crash) vector
See CVE-2006-4997
* ip6_flowlabel-lockup.dpatch
[SECURITY] Fix local DoS attack vector (lockups, oopses) in the
sequence handling for /proc/net/ip6_flowlabel
See CVE-2006-5619
* ppc-alignment-exception-table-check.dpatch
[SECURITY][ppc] Avoid potential DoS which can be triggered by some
futex ops
See CVE-2006-5649
* s390-uaccess-memleak.dpatch
[SECURITY][s390] Fix memory leak in copy_from_user by clearing the
remaining bytes of the kernel buffer after a fault on the userspace
address in copy_from_user()
See CVE-2006-5174
* smbfs-honor-mount-opts.dpatch
Honor uid, gid and mode mount options for smbfs even when unix extensions
are enabled
See CVE-2006-5871
* bridge-get_fdb_entries-overflow.dpatch
Protect against possible overflow in get_fdb_entries
See CVE-2006-5751
* Build against kernel-patch-2.6.8-hppa (2.6.8-5sarge1)
* Update patch to apply to kernel-tree-2.6.8-16sarge6
Files:
0c3a2b31ce52efdd3d25892bc8dbe4a7 211598 devel optional kernel-headers-2.6.8-3-64-smp_2.6.8-6sarge6_hppa.deb
1eb1a08a3677ac93c3f2b881a6372830 69167 devel optional kernel-image-2.6.8-hppa_2.6.8-6sarge6.tar.gz
4f856b7eb46570f2ff63872c76370557 213308 devel optional kernel-headers-2.6.8-3-32_2.6.8-6sarge6_hppa.deb
7f48536252a7f397d4c3ccaa5c27acd1 16945098 base optional kernel-image-2.6.8-3-32-smp_2.6.8-6sarge6_hppa.deb
a992f3eea9565bbad701e8b7b9de901e 1013 devel optional kernel-image-2.6.8-hppa_2.6.8-6sarge6.dsc
8b7c179ad04d28d4351ef0335a71f846 212830 devel optional kernel-headers-2.6.8-3-32-smp_2.6.8-6sarge6_hppa.deb
964f4250b6228da3ffb42506831f952d 212172 devel optional kernel-headers-2.6.8-3-64_2.6.8-6sarge6_hppa.deb
bc84726f1d311731839a482470eac180 18323104 base optional kernel-image-2.6.8-3-64-smp_2.6.8-6sarge6_hppa.deb
be22fbe687ccbdc74e46d82a50aa67e8 17488884 base optional kernel-image-2.6.8-3-64_2.6.8-6sarge6_hppa.deb
e66daaf1ddef2c2d2d85c884487e94e1 2802706 devel optional kernel-headers-2.6.8-3_2.6.8-6sarge6_hppa.deb
f4f0f9265fbe9759a8226791494c3d87 16038152 base optional kernel-image-2.6.8-3-32_2.6.8-6sarge6_hppa.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iD8DBQFFeEq3huANDBmkLRkRArHcAKCDDq2XLqP1MjyehHXhqaXQkTydDACaAmAo
31si4XJmYug0xC74/BUHAKE=
=sGkX
-----END PGP SIGNATURE-----
Accepted:
kernel-headers-2.6.8-3-32-smp_2.6.8-6sarge6_hppa.deb
to pool/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32-smp_2.6.8-6sarge6_hppa.deb
kernel-headers-2.6.8-3-32_2.6.8-6sarge6_hppa.deb
to pool/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32_2.6.8-6sarge6_hppa.deb
kernel-headers-2.6.8-3-64-smp_2.6.8-6sarge6_hppa.deb
to pool/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64-smp_2.6.8-6sarge6_hppa.deb
kernel-headers-2.6.8-3-64_2.6.8-6sarge6_hppa.deb
to pool/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64_2.6.8-6sarge6_hppa.deb
kernel-headers-2.6.8-3_2.6.8-6sarge6_hppa.deb
to pool/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3_2.6.8-6sarge6_hppa.deb
kernel-image-2.6.8-3-32-smp_2.6.8-6sarge6_hppa.deb
to pool/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32-smp_2.6.8-6sarge6_hppa.deb
kernel-image-2.6.8-3-32_2.6.8-6sarge6_hppa.deb
to pool/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32_2.6.8-6sarge6_hppa.deb
kernel-image-2.6.8-3-64-smp_2.6.8-6sarge6_hppa.deb
to pool/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64-smp_2.6.8-6sarge6_hppa.deb
kernel-image-2.6.8-3-64_2.6.8-6sarge6_hppa.deb
to pool/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64_2.6.8-6sarge6_hppa.deb
kernel-image-2.6.8-hppa_2.6.8-6sarge6.dsc
to pool/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge6.dsc
kernel-image-2.6.8-hppa_2.6.8-6sarge6.tar.gz
to pool/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge6.tar.gz
Reply to: