Accepted kernel-image-2.6.8-alpha 2.6.8-16sarge6 (alpha source)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Tue, 5 Dec 2006 02:19:29 -0700
Source: kernel-image-2.6.8-alpha
Binary: kernel-image-2.6.8-3-smp kernel-headers-2.6.8-3-smp kernel-image-2.6.8-3-generic kernel-headers-2.6.8-3-generic kernel-headers-2.6.8-3
Architecture: alpha source
Version: 2.6.8-16sarge6
Distribution: stable-security
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description:
kernel-headers-2.6.8-3 - Header files related to Linux kernel version 2.6.8
kernel-headers-2.6.8-3-generic - Linux kernel headers 2.6.8 on Alpha
kernel-headers-2.6.8-3-smp - Linux kernel headers 2.6.8 on Alpha SMP
kernel-image-2.6.8-3-generic - Linux kernel image for version 2.6.8 on Alpha.
kernel-image-2.6.8-3-smp - Linux kernel image for version 2.6.8 on Alpha SMP.
Changes:
kernel-image-2.6.8-alpha (2.6.8-16sarge6) stable-security; urgency=high
.
* Build against kernel-tree-2.6.8-16sarge6:
* perfmon-fd-refcnt.dpatch
[SECURITY][ia64] Fix file descriptor leak in perfmonctl
system call which could be used as a local denial of service attack
by depleting the system of file descriptors
See CVE-2006-3741
* ia64-sparc-cross-region-mappings.dpatch
[SECURITY] Prevent cross-region mappings on ia64 and sparc which
could be used in a local DoS attack (system crash)
See CVE-2006-4538
* __block_prepare_write-recovery.dpatch
[SECURITY] Fix an information leak in __block_prepare_write()
See CVE-2006-4813
* atm-clip-freed-skb-deref.dpatch
[SECURITY] Avoid dereferencing an already freed skb, preventing a
potential remote DoS (system crash) vector
See CVE-2006-4997
* ip6_flowlabel-lockup.dpatch
[SECURITY] Fix local DoS attack vector (lockups, oopses) in the
sequence handling for /proc/net/ip6_flowlabel
See CVE-2006-5619
* ppc-alignment-exception-table-check.dpatch
[SECURITY][ppc] Avoid potential DoS which can be triggered by some
futex ops
See CVE-2006-5649
* s390-uaccess-memleak.dpatch
[SECURITY][s390] Fix memory leak in copy_from_user by clearing the
remaining bytes of the kernel buffer after a fault on the userspace
address in copy_from_user()
See CVE-2006-5174
* smbfs-honor-mount-opts.dpatch
Honor uid, gid and mode mount options for smbfs even when unix extensions
are enabled
See CVE-2006-5871
* bridge-get_fdb_entries-overflow.dpatch
Protect against possible overflow in get_fdb_entries
See CVE-2006-5751
Files:
02018d26ea8bfd1e0b8af7580ba05113 228886 devel optional kernel-headers-2.6.8-3-smp_2.6.8-16sarge6_alpha.deb
4043f87dd5ae9112e28a72094bea4a86 233604 devel optional kernel-headers-2.6.8-3-generic_2.6.8-16sarge6_alpha.deb
4e5045c3579ad31ff3ef6bc7c37bd292 40661 devel optional kernel-image-2.6.8-alpha_2.6.8-16sarge6.tar.gz
816d6775108cf3e9515b5605849d3051 20237958 base optional kernel-image-2.6.8-3-generic_2.6.8-16sarge6_alpha.deb
83f1d28bc308bc26af3d17abacfdd30f 2761698 devel optional kernel-headers-2.6.8-3_2.6.8-16sarge6_alpha.deb
e66a50b7968d11f9a1951d544134ebd0 20097652 base optional kernel-image-2.6.8-3-smp_2.6.8-16sarge6_alpha.deb
f693cfc9f2cd655d084ca005326c126e 812 devel optional kernel-image-2.6.8-alpha_2.6.8-16sarge6.dsc
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iD8DBQFFeEkWhuANDBmkLRkRAhjoAJsF4L4herAgdsHcIFVfb0jsjlIE9wCeLtVB
tubo0IQfULL2TPjyUounpG8=
=AS3x
-----END PGP SIGNATURE-----
Accepted:
kernel-headers-2.6.8-3-generic_2.6.8-16sarge6_alpha.deb
to pool/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-generic_2.6.8-16sarge6_alpha.deb
kernel-headers-2.6.8-3-smp_2.6.8-16sarge6_alpha.deb
to pool/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-smp_2.6.8-16sarge6_alpha.deb
kernel-headers-2.6.8-3_2.6.8-16sarge6_alpha.deb
to pool/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3_2.6.8-16sarge6_alpha.deb
kernel-image-2.6.8-3-generic_2.6.8-16sarge6_alpha.deb
to pool/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-generic_2.6.8-16sarge6_alpha.deb
kernel-image-2.6.8-3-smp_2.6.8-16sarge6_alpha.deb
to pool/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-smp_2.6.8-16sarge6_alpha.deb
kernel-image-2.6.8-alpha_2.6.8-16sarge6.dsc
to pool/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge6.dsc
kernel-image-2.6.8-alpha_2.6.8-16sarge6.tar.gz
to pool/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge6.tar.gz
Reply to: