Accepted fai-kernels 1.9.1sarge5 (source i386)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Thu, 7 Dec 2006 10:11:45 -0700
Source: fai-kernels
Binary: fai-kernels
Architecture: source i386
Version: 1.9.1sarge5
Distribution: stable-security
Urgency: low
Maintainer: Thomas Lange <lange@debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description:
fai-kernels - special kernels for FAI (Fully Automatic Installation)
Closes: 310982
Changes:
fai-kernels (1.9.1sarge5) stable-security; urgency=low
.
* NMU by the Security Team
* Build against kernel-tree-2.4.27-10sarge5:
* 233_ia64-sparc-cross-region-mappings.diff
[SECURITY] Prevent cross-region mappings on ia64 and sparc which
could be used in a local DoS attack (system crash)
See CVE-2006-4538
* 234_atm-clip-freed-skb-deref.diff
[SECURITY] Avoid dereferencing an already freed skb, preventing a
potential remote DoS (system crash) vector
See CVE-2006-4997
* 235_ppc-alignment-exception-table-check.diff
[SECURITY][ppc] Avoid potential DoS which can be triggered by some
futex ops
See CVE-2006-5649
* 236_s390-uaccess-memleak.diff
[SECURITY][s390] Fix memory leak in copy_from_user by clearing the
remaining bytes of the kernel buffer after a fault on the userspace
address in copy_from_user()
See CVE-2006-5174
* 237_smbfs-honor-mount-opts.diff
Honor uid, gid and mode mount options for smbfs even when unix extensions
are enabled (closes: #310982)
See CVE-2006-5871
* 238_ppc-hid0-dos.diff
[SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on
PPC970 at boot time
See CVE-2006-4093
* Build against kernel-tree-2.6.8-16sarge6:
* perfmon-fd-refcnt.dpatch
[SECURITY][ia64] Fix file descriptor leak in perfmonctl
system call which could be used as a local denial of service attack
by depleting the system of file descriptors
See CVE-2006-3741
* ia64-sparc-cross-region-mappings.dpatch
[SECURITY] Prevent cross-region mappings on ia64 and sparc which
could be used in a local DoS attack (system crash)
See CVE-2006-4538
* __block_prepare_write-recovery.dpatch
[SECURITY] Fix an information leak in __block_prepare_write()
See CVE-2006-4813
* atm-clip-freed-skb-deref.dpatch
[SECURITY] Avoid dereferencing an already freed skb, preventing a
potential remote DoS (system crash) vector
See CVE-2006-4997
* ip6_flowlabel-lockup.dpatch
[SECURITY] Fix local DoS attack vector (lockups, oopses) in the
sequence handling for /proc/net/ip6_flowlabel
See CVE-2006-5619
* ppc-alignment-exception-table-check.dpatch
[SECURITY][ppc] Avoid potential DoS which can be triggered by some
futex ops
See CVE-2006-5649
* s390-uaccess-memleak.dpatch
[SECURITY][s390] Fix memory leak in copy_from_user by clearing the
remaining bytes of the kernel buffer after a fault on the userspace
address in copy_from_user()
See CVE-2006-5174
* smbfs-honor-mount-opts.dpatch
Honor uid, gid and mode mount options for smbfs even when unix extensions
are enabled
See CVE-2006-5871
* bridge-get_fdb_entries-overflow.dpatch
Protect against possible overflow in get_fdb_entries
See CVE-2006-5751
Files:
011ee5100e419cb2f0c7bc1cc30ac84a 621 admin extra fai-kernels_1.9.1sarge5.dsc
d148029e7fe13f42ab21c5eb43de8204 29571 admin extra fai-kernels_1.9.1sarge5.tar.gz
a235fc98f68f558e5ecc1ec7b42dd57e 12002364 admin extra fai-kernels_1.9.1sarge5_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iD8DBQFFeFXihuANDBmkLRkRAmpUAJ9J5QqrAVGqFSR4pLT4BKdcx2dO5gCeOQ6t
jnQK/6l2GHRm0K8AQ/vy9w0=
=GNEC
-----END PGP SIGNATURE-----
Accepted:
fai-kernels_1.9.1sarge5.dsc
to pool/main/f/fai-kernels/fai-kernels_1.9.1sarge5.dsc
fai-kernels_1.9.1sarge5.tar.gz
to pool/main/f/fai-kernels/fai-kernels_1.9.1sarge5.tar.gz
fai-kernels_1.9.1sarge5_i386.deb
to pool/main/f/fai-kernels/fai-kernels_1.9.1sarge5_i386.deb
Reply to: