[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted kernel-image-2.6.8-m68k 2.6.8-4sarge6 (source m68k)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue,  5 Dec 2006 02:20:58 -0700
Source: kernel-image-2.6.8-m68k
Binary: kernel-image-2.6.8-sun3x kernel-image-2.6.8-bvme6000 kernel-image-2.6.8-q40 kernel-image-2.6.8-atari kernel-image-2.6.8-mvme147 kernel-image-2.6.8-amiga kernel-image-2.6.8-sun3 kernel-image-2.6.8-mac kernel-image-2.6.8-hp kernel-image-2.6.8-mvme16x
Architecture: m68k source 
Version: 2.6.8-4sarge6
Distribution: stable-security
Urgency: high
Maintainer: Christian T. Steigies <cts@debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description: 
 kernel-image-2.6.8-amiga - Linux kernel image for Amiga computers
 kernel-image-2.6.8-atari - Linux kernel image for Atari computers
 kernel-image-2.6.8-bvme6000 - Linux kernel image for BVM BVME4000 and BVME6000 SBCs.
 kernel-image-2.6.8-hp - Linux kernel image for hp computers
 kernel-image-2.6.8-mac - Linux kernel image for Macintosh computers
 kernel-image-2.6.8-mvme147 - Linux kernel image for Motorola MVME147 SBCs.
 kernel-image-2.6.8-mvme16x - Linux kernel image for Motorola MVME162/6/7, MVME172/7 SBCs.
 kernel-image-2.6.8-q40 - Linux kernel image for Q40 and Q60 computers
 kernel-image-2.6.8-sun3 - Linux kernel image for sun3 computers
 kernel-image-2.6.8-sun3x - Linux kernel image for sun3x computers
Changes: 
 kernel-image-2.6.8-m68k (2.6.8-4sarge6) stable-security; urgency=high
 .
   * Build against kernel-tree-2.6.8-16sarge6:
     * perfmon-fd-refcnt.dpatch
       [SECURITY][ia64] Fix file descriptor leak in perfmonctl
       system call which could be used as a local denial of service attack
       by depleting the system of file descriptors
       See CVE-2006-3741
     * ia64-sparc-cross-region-mappings.dpatch
       [SECURITY] Prevent cross-region mappings on ia64 and sparc which
       could be used in a local DoS attack (system crash)
       See CVE-2006-4538
     * __block_prepare_write-recovery.dpatch
       [SECURITY] Fix an information leak in __block_prepare_write()
       See CVE-2006-4813
     * atm-clip-freed-skb-deref.dpatch
       [SECURITY] Avoid dereferencing an already freed skb, preventing a
       potential remote DoS (system crash) vector
       See CVE-2006-4997
     * ip6_flowlabel-lockup.dpatch
       [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
       sequence handling for /proc/net/ip6_flowlabel
       See CVE-2006-5619
     * ppc-alignment-exception-table-check.dpatch
       [SECURITY][ppc] Avoid potential DoS which can be triggered by some
       futex ops
       See CVE-2006-5649
     * s390-uaccess-memleak.dpatch
       [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
       remaining bytes of the kernel buffer after a fault on the userspace
       address in copy_from_user()
       See CVE-2006-5174
     * smbfs-honor-mount-opts.dpatch
       Honor uid, gid and mode mount options for smbfs even when unix extensions
       are enabled
       See CVE-2006-5871
     * bridge-get_fdb_entries-overflow.dpatch
       Protect against possible overflow in get_fdb_entries
       See CVE-2006-5751
Files: 
 038b505e49d176ff9c6c2c29008c81b6 3017094 base optional kernel-image-2.6.8-bvme6000_2.6.8-4sarge6_m68k.deb
 072ad661017bb265f727971d64d22713 2996748 base optional kernel-image-2.6.8-sun3_2.6.8-4sarge6_m68k.deb
 e0b1a23eb96c7f518d5f6ebbf55de163 874 devel optional kernel-image-2.6.8-m68k_2.6.8-4sarge6.dsc
 19f3b7edc060d43e53340d9089d75f85 3307308 base optional kernel-image-2.6.8-amiga_2.6.8-4sarge6_m68k.deb
 290c886ef124a7e8e0081c787dac1e02 3050512 base optional kernel-image-2.6.8-mvme16x_2.6.8-4sarge6_m68k.deb
 4f07b7599c4bf68fce66dc1b3d50027e 3176400 base optional kernel-image-2.6.8-mac_2.6.8-4sarge6_m68k.deb
 ec0effc4a6dc039914338c10ef487de9 19011 devel optional kernel-image-2.6.8-m68k_2.6.8-4sarge6.tar.gz
 74ac4e38ff78db512904f6fde1942d7d 2981206 base optional kernel-image-2.6.8-mvme147_2.6.8-4sarge6_m68k.deb
 bed2bdc831f4aceb2cdab00dc6c9ff74 3111864 base optional kernel-image-2.6.8-q40_2.6.8-4sarge6_m68k.deb
 c71f6661668cc4b7d24a74d05c61ec0f 3105070 base optional kernel-image-2.6.8-atari_2.6.8-4sarge6_m68k.deb
 fd8a9013b726c7cdd3af0ffc788ed464 2990546 base optional kernel-image-2.6.8-hp_2.6.8-4sarge6_m68k.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFeE78huANDBmkLRkRAnztAJwK4Qnc5zEg5XgGbU7QGxzHkB75CgCeMmhV
uNO+l51Pu/MJgXDFW5swJnA=
=nlM4
-----END PGP SIGNATURE-----


Accepted:
kernel-image-2.6.8-amiga_2.6.8-4sarge6_m68k.deb
  to pool/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-amiga_2.6.8-4sarge6_m68k.deb
kernel-image-2.6.8-atari_2.6.8-4sarge6_m68k.deb
  to pool/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-atari_2.6.8-4sarge6_m68k.deb
kernel-image-2.6.8-bvme6000_2.6.8-4sarge6_m68k.deb
  to pool/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-bvme6000_2.6.8-4sarge6_m68k.deb
kernel-image-2.6.8-hp_2.6.8-4sarge6_m68k.deb
  to pool/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-hp_2.6.8-4sarge6_m68k.deb
kernel-image-2.6.8-m68k_2.6.8-4sarge6.dsc
  to pool/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge6.dsc
kernel-image-2.6.8-m68k_2.6.8-4sarge6.tar.gz
  to pool/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge6.tar.gz
kernel-image-2.6.8-mac_2.6.8-4sarge6_m68k.deb
  to pool/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mac_2.6.8-4sarge6_m68k.deb
kernel-image-2.6.8-mvme147_2.6.8-4sarge6_m68k.deb
  to pool/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme147_2.6.8-4sarge6_m68k.deb
kernel-image-2.6.8-mvme16x_2.6.8-4sarge6_m68k.deb
  to pool/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme16x_2.6.8-4sarge6_m68k.deb
kernel-image-2.6.8-q40_2.6.8-4sarge6_m68k.deb
  to pool/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-q40_2.6.8-4sarge6_m68k.deb
kernel-image-2.6.8-sun3_2.6.8-4sarge6_m68k.deb
  to pool/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-sun3_2.6.8-4sarge6_m68k.deb



Reply to: