-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Tue, 5 Dec 2006 21:40:55 -0700 Source: kernel-image-2.6.8-hppa Binary: kernel-headers-2.6.8-3-32 kernel-image-2.6.8-3-32 kernel-image-2.6.8-3-64-smp kernel-image-2.6.8-3-64 kernel-headers-2.6.8-3-64-smp kernel-image-2.6.8-3-32-smp kernel-headers-2.6.8-3-32-smp kernel-headers-2.6.8-3 kernel-headers-2.6.8-3-64 Architecture: hppa source Version: 2.6.8-6sarge6 Distribution: stable-security Urgency: high Maintainer: Kyle McMartin <kyle@debian.org> Changed-By: dann frazier <dannf@debian.org> Description: kernel-headers-2.6.8-3 - Header files for the Linux kernel version 2.6.8 kernel-headers-2.6.8-3-32 - Linux kernel headers 2.6.8 on HP PA-RISC 32-bit systems kernel-headers-2.6.8-3-32-smp - Linux kernel headers 2.6.8 on HP PA-RISC 32-bit systems kernel-headers-2.6.8-3-64 - Linux kernel headers 2.6.8 on HP PA-RISC 64-bit systems kernel-headers-2.6.8-3-64-smp - Linux kernel headers 2.6.8 on HP PA-RISC 64-bit systems kernel-image-2.6.8-3-32 - Linux kernel image for version 2.6.8 on 32-bit PA-RISC kernel-image-2.6.8-3-32-smp - Linux kernel image for version 2.6.8 on 32-bit PA-RISC kernel-image-2.6.8-3-64 - Linux kernel image for version 2.6.8 on 64-bit PA-RISC kernel-image-2.6.8-3-64-smp - Linux kernel image for version 2.6.8 on 64-bit PA-RISC Changes: kernel-image-2.6.8-hppa (2.6.8-6sarge6) stable-security; urgency=high . * Build against kernel-tree-2.6.8-16sarge6: * perfmon-fd-refcnt.dpatch [SECURITY][ia64] Fix file descriptor leak in perfmonctl system call which could be used as a local denial of service attack by depleting the system of file descriptors See CVE-2006-3741 * ia64-sparc-cross-region-mappings.dpatch [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * __block_prepare_write-recovery.dpatch [SECURITY] Fix an information leak in __block_prepare_write() See CVE-2006-4813 * atm-clip-freed-skb-deref.dpatch [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * ip6_flowlabel-lockup.dpatch [SECURITY] Fix local DoS attack vector (lockups, oopses) in the sequence handling for /proc/net/ip6_flowlabel See CVE-2006-5619 * ppc-alignment-exception-table-check.dpatch [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * s390-uaccess-memleak.dpatch [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * smbfs-honor-mount-opts.dpatch Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled See CVE-2006-5871 * bridge-get_fdb_entries-overflow.dpatch Protect against possible overflow in get_fdb_entries See CVE-2006-5751 * Build against kernel-patch-2.6.8-hppa (2.6.8-5sarge1) * Update patch to apply to kernel-tree-2.6.8-16sarge6 Files: 0c3a2b31ce52efdd3d25892bc8dbe4a7 211598 devel optional kernel-headers-2.6.8-3-64-smp_2.6.8-6sarge6_hppa.deb 1eb1a08a3677ac93c3f2b881a6372830 69167 devel optional kernel-image-2.6.8-hppa_2.6.8-6sarge6.tar.gz 4f856b7eb46570f2ff63872c76370557 213308 devel optional kernel-headers-2.6.8-3-32_2.6.8-6sarge6_hppa.deb 7f48536252a7f397d4c3ccaa5c27acd1 16945098 base optional kernel-image-2.6.8-3-32-smp_2.6.8-6sarge6_hppa.deb a992f3eea9565bbad701e8b7b9de901e 1013 devel optional kernel-image-2.6.8-hppa_2.6.8-6sarge6.dsc 8b7c179ad04d28d4351ef0335a71f846 212830 devel optional kernel-headers-2.6.8-3-32-smp_2.6.8-6sarge6_hppa.deb 964f4250b6228da3ffb42506831f952d 212172 devel optional kernel-headers-2.6.8-3-64_2.6.8-6sarge6_hppa.deb bc84726f1d311731839a482470eac180 18323104 base optional kernel-image-2.6.8-3-64-smp_2.6.8-6sarge6_hppa.deb be22fbe687ccbdc74e46d82a50aa67e8 17488884 base optional kernel-image-2.6.8-3-64_2.6.8-6sarge6_hppa.deb e66daaf1ddef2c2d2d85c884487e94e1 2802706 devel optional kernel-headers-2.6.8-3_2.6.8-6sarge6_hppa.deb f4f0f9265fbe9759a8226791494c3d87 16038152 base optional kernel-image-2.6.8-3-32_2.6.8-6sarge6_hppa.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFFeEq3huANDBmkLRkRArHcAKCDDq2XLqP1MjyehHXhqaXQkTydDACaAmAo 31si4XJmYug0xC74/BUHAKE= =sGkX -----END PGP SIGNATURE----- Accepted: kernel-headers-2.6.8-3-32-smp_2.6.8-6sarge6_hppa.deb to pool/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32-smp_2.6.8-6sarge6_hppa.deb kernel-headers-2.6.8-3-32_2.6.8-6sarge6_hppa.deb to pool/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32_2.6.8-6sarge6_hppa.deb kernel-headers-2.6.8-3-64-smp_2.6.8-6sarge6_hppa.deb to pool/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64-smp_2.6.8-6sarge6_hppa.deb kernel-headers-2.6.8-3-64_2.6.8-6sarge6_hppa.deb to pool/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64_2.6.8-6sarge6_hppa.deb kernel-headers-2.6.8-3_2.6.8-6sarge6_hppa.deb to pool/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3_2.6.8-6sarge6_hppa.deb kernel-image-2.6.8-3-32-smp_2.6.8-6sarge6_hppa.deb to pool/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32-smp_2.6.8-6sarge6_hppa.deb kernel-image-2.6.8-3-32_2.6.8-6sarge6_hppa.deb to pool/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32_2.6.8-6sarge6_hppa.deb kernel-image-2.6.8-3-64-smp_2.6.8-6sarge6_hppa.deb to pool/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64-smp_2.6.8-6sarge6_hppa.deb kernel-image-2.6.8-3-64_2.6.8-6sarge6_hppa.deb to pool/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64_2.6.8-6sarge6_hppa.deb kernel-image-2.6.8-hppa_2.6.8-6sarge6.dsc to pool/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge6.dsc kernel-image-2.6.8-hppa_2.6.8-6sarge6.tar.gz to pool/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge6.tar.gz