[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted kernel-source-2.6.8 2.6.8-16sarge6 (source all)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon,  4 Dec 2006 19:11:05 -0700
Source: kernel-source-2.6.8
Binary: kernel-source-2.6.8 kernel-doc-2.6.8 kernel-tree-2.6.8 kernel-patch-debian-2.6.8
Architecture: source all
Version: 2.6.8-16sarge6
Distribution: stable-security
Urgency: high
Maintainer: Debian kernel team <debian-kernel@lists.debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description: 
 kernel-doc-2.6.8 - Linux kernel specific documentation for version 2.6.8
 kernel-patch-debian-2.6.8 - Debian patches to Linux 2.6.8
 kernel-source-2.6.8 - Linux kernel source for version 2.6.8 with Debian patches
 kernel-tree-2.6.8 - Linux kernel source tree for building Debian kernel images
Changes: 
 kernel-source-2.6.8 (2.6.8-16sarge6) stable-security; urgency=high
 .
   * perfmon-fd-refcnt.dpatch
     [SECURITY][ia64] Fix file descriptor leak in perfmonctl
     system call which could be used as a local denial of service attack
     by depleting the system of file descriptors
     See CVE-2006-3741
   * ia64-sparc-cross-region-mappings.dpatch
     [SECURITY] Prevent cross-region mappings on ia64 and sparc which
     could be used in a local DoS attack (system crash)
     See CVE-2006-4538
   * __block_prepare_write-recovery.dpatch
     [SECURITY] Fix an information leak in __block_prepare_write()
     See CVE-2006-4813
   * atm-clip-freed-skb-deref.dpatch
     [SECURITY] Avoid dereferencing an already freed skb, preventing a
     potential remote DoS (system crash) vector
     See CVE-2006-4997
   * ip6_flowlabel-lockup.dpatch
     [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
     sequence handling for /proc/net/ip6_flowlabel
     See CVE-2006-5619
   * ppc-alignment-exception-table-check.dpatch
     [SECURITY][ppc] Avoid potential DoS which can be triggered by some
     futex ops
     See CVE-2006-5649
   * s390-uaccess-memleak.dpatch
     [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
     remaining bytes of the kernel buffer after a fault on the userspace
     address in copy_from_user()
     See CVE-2006-5174
   * smbfs-honor-mount-opts.dpatch
     Honor uid, gid and mode mount options for smbfs even when unix extensions
     are enabled
     See CVE-2006-5871
   * bridge-get_fdb_entries-overflow.dpatch
     Protect against possible overflow in get_fdb_entries
     See CVE-2006-5751
Files: 
 9e5b12cb1d4c98cddc88e5c36bf7d951 1002 devel optional kernel-source-2.6.8_2.6.8-16sarge6.dsc
 1d83d174a3b2f5e6b03bcbf53c4d877f 1067572 devel optional kernel-source-2.6.8_2.6.8-16sarge6.diff.gz
 3156984be3fc859f717a4253bd0ea462 1116726 devel optional kernel-patch-debian-2.6.8_2.6.8-16sarge6_all.deb
 4b4ecbf67cb066043d0d9447b5238d28 34943318 devel optional kernel-source-2.6.8_2.6.8-16sarge6_all.deb
 67ed3f0138673fdf06494239a3531972 36670 devel optional kernel-tree-2.6.8_2.6.8-16sarge6_all.deb
 9c16bf9ab5f0ecf6551812f3e0e693ac 6192778 doc optional kernel-doc-2.6.8_2.6.8-16sarge6_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFeD1ihuANDBmkLRkRApT4AJ9PF9bvJg0k4bqewXJy2YiaXjlvrwCdFkxh
d5PfuGnQwPk9BkwbXg13vyw=
=GkYB
-----END PGP SIGNATURE-----


Accepted:
kernel-doc-2.6.8_2.6.8-16sarge6_all.deb
  to pool/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge6_all.deb
kernel-patch-debian-2.6.8_2.6.8-16sarge6_all.deb
  to pool/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge6_all.deb
kernel-source-2.6.8_2.6.8-16sarge6.diff.gz
  to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge6.diff.gz
kernel-source-2.6.8_2.6.8-16sarge6.dsc
  to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge6.dsc
kernel-source-2.6.8_2.6.8-16sarge6_all.deb
  to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge6_all.deb
kernel-tree-2.6.8_2.6.8-16sarge6_all.deb
  to pool/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge6_all.deb



Reply to: