-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Tue, 19 Feb 2008 20:51:43 -0700 Source: kernel-image-2.6.8-hppa Binary: kernel-image-2.6.8-4-64-smp kernel-headers-2.6.8-4-64-smp kernel-headers-2.6.8-4-32-smp kernel-headers-2.6.8-4 kernel-image-2.6.8-4-64 kernel-headers-2.6.8-4-32 kernel-headers-2.6.8-4-64 kernel-image-2.6.8-4-32-smp kernel-image-2.6.8-4-32 Architecture: source hppa Version: 2.6.8-7sarge1 Distribution: oldstable-security Urgency: high Maintainer: Kyle McMartin <kyle@debian.org> Changed-By: dann frazier <dannf@debian.org> Description: kernel-headers-2.6.8-4 - Header files for the Linux kernel version 2.6.8 kernel-headers-2.6.8-4-32 - Linux kernel headers 2.6.8 on HP PA-RISC 32-bit systems kernel-headers-2.6.8-4-32-smp - Linux kernel headers 2.6.8 on HP PA-RISC 32-bit systems kernel-headers-2.6.8-4-64 - Linux kernel headers 2.6.8 on HP PA-RISC 64-bit systems kernel-headers-2.6.8-4-64-smp - Linux kernel headers 2.6.8 on HP PA-RISC 64-bit systems kernel-image-2.6.8-4-32 - Linux kernel image for version 2.6.8 on 32-bit PA-RISC kernel-image-2.6.8-4-32-smp - Linux kernel image for version 2.6.8 on 32-bit PA-RISC kernel-image-2.6.8-4-64 - Linux kernel image for version 2.6.8 on 64-bit PA-RISC kernel-image-2.6.8-4-64-smp - Linux kernel image for version 2.6.8 on 64-bit PA-RISC Changes: kernel-image-2.6.8-hppa (2.6.8-7sarge1) oldstable-security; urgency=high . * Rebuild against kernel-tree-2.6.8-17sarge1 * compat_sys_mount-NULL-data_page.dpatch [SECURITY] Fix oops in compat_sys_mount triggered by NULL data_page See CVE-2006-7203 * pppoe-socket-release-mem-leak.dpatch [SECURITY] fix unpriveleged memory leak when a PPPoE socket is released after connect but before PPPIOCGCHAN ioctl is called upon it See CVE-2007-2525 * dn_fib-out-of-bounds.dpatch, ipv4-fib_props-out-of-bounds.dpatch [SECURITY] Fix out of bounds condition in dn_fib_props[] See CVE-2007-2172 * aacraid-ioctl-perm-check.dpatch [SECURITY] Require admin capabilities to issue ioctls to aacraid devices See CVE-2007-4308 * reset-pdeathsig-on-suid.dpatch [SECURITY] Fix potential privilege escalation caused by improper clearing of the child process' pdeath signal. See CVE-2007-3848 * bluetooth-l2cap-hci-info-leaks.dpatch [SECURITY] Fix information leaks in setsockopt() implementations See CVE-2007-1353 * coredump-only-to-same-uid.dpatch [SECURITY] Fix an issue where core dumping over a file that already exists retains the ownership of the original file See CVE-2007-6206 * i4l-isdn_ioctl-mem-overrun.dpatch [SECURITY] Fix potential isdn ioctl memory overrun See CVE-2007-6151 * cramfs-check-block-length.dpatch [SECURITY] Add a sanity check of the block length in cramfs_readpage to avoid a potential oops condition See CVE-2006-5823 * ext2-skip-pages-past-num-blocks.dpatch [SECURITY] Add some sanity checking for a corrupted i_size in ext2_find_entry() See CVE-2006-6054 * minixfs-printk-hang.dpatch [SECURITY] Rate-limit printks caused by accessing a corrupted minixfs filesystem that would otherwise cause a system to hang (printk storm) See CVE-2006-6058 * isdn-net-overflow.dpatch [SECURITY] Fix potential overflows in the ISDN subsystem See CVE-2007-6063 * prevent-stack-growth-into-hugetlb-region.dpatch [SECURITY] Prevent OOPS during stack expansion when the VMA crosses into address space reserved for hugetlb pages. See CVE-2007-3739 * cifs-honor-umask.dpatch [SECURITY] Make CIFS honor a process' umask See CVE-2007-3740 * hugetlb-prio_tree-unit-fix.dpatch [SECURITY] Fix misconversion of hugetlb_vmtruncate_list to prio_tree which could be used to trigger a BUG_ON() call in exit_mmap. See CVE-2007-4133 * amd64-zero-extend-32bit-ptrace.dpatch [SECURITY] Zero extend all registers after ptrace in 32-bit entry path. See CVE-2007-4573 * usb-pwc-disconnect-block.dpatch [SECURITY] Fix issue with unplugging webcams that use the pwc driver. If userspace still has the device open it can result, the driver would wait for the device to close, blocking the USB subsystem. See CVE-2007-5093 * powerpc-chrp-null-deref.dpatch [SECURITY][powerpc] Fix NULL pointer dereference if get_property fails on the subarchitecture See CVE-2007-6694 * random-bound-check-ordering.dpatch [SECURITY] Fix stack-based buffer overflow in the random number generator See CVE-2007-3105 * mmap-VM_DONTEXPAND.dpatch [SECURITY] Add VM_DONTEXPAND to vm_flags in drivers that register a fault handler but do not bounds check the offset argument See CVE-2008-0007 Files: defcdc70dd9d969ddfaed2819b341758 1013 devel optional kernel-image-2.6.8-hppa_2.6.8-7sarge1.dsc 97e4fadb9612c1a9ce969a0cbdc663f4 73206 devel optional kernel-image-2.6.8-hppa_2.6.8-7sarge1.tar.gz 0a14c1185bcde28d0a97eaeef9e11e3f 2820206 devel optional kernel-headers-2.6.8-4_2.6.8-7sarge1_hppa.deb ff98c244a5777bf1cb9d3aa42e92035b 219758 devel optional kernel-headers-2.6.8-4-64_2.6.8-7sarge1_hppa.deb fabf823c16fcb3e0bbf69d0081faafd8 17550802 base optional kernel-image-2.6.8-4-64_2.6.8-7sarge1_hppa.deb e3419d467dc69e90e2db720c519268d3 220598 devel optional kernel-headers-2.6.8-4-32_2.6.8-7sarge1_hppa.deb cb91278b4861aa27da3555e3ae05a842 16110870 base optional kernel-image-2.6.8-4-32_2.6.8-7sarge1_hppa.deb 5e8db88176af86cf5d5968dac2816ac6 220054 devel optional kernel-headers-2.6.8-4-32-smp_2.6.8-7sarge1_hppa.deb 1e3f2fc9f9764e1823054df8abde860c 17020158 base optional kernel-image-2.6.8-4-32-smp_2.6.8-7sarge1_hppa.deb ff1d717d7b3d1db40c96d15b96b8a447 219244 devel optional kernel-headers-2.6.8-4-64-smp_2.6.8-7sarge1_hppa.deb e088d77a7e64efa4d825416f94fd5db6 18374164 base optional kernel-image-2.6.8-4-64-smp_2.6.8-7sarge1_hppa.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHvNkZhuANDBmkLRkRAvVoAKCEYLRJoUcOWeK2RyQEW81Vl97OfgCcDJ8F AtRzOpsbHqe0Ozhsc8GfuGM= =m1C9 -----END PGP SIGNATURE----- Accepted: kernel-headers-2.6.8-4-32-smp_2.6.8-7sarge1_hppa.deb to pool/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-4-32-smp_2.6.8-7sarge1_hppa.deb kernel-headers-2.6.8-4-32_2.6.8-7sarge1_hppa.deb to pool/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-4-32_2.6.8-7sarge1_hppa.deb kernel-headers-2.6.8-4-64-smp_2.6.8-7sarge1_hppa.deb to pool/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-4-64-smp_2.6.8-7sarge1_hppa.deb kernel-headers-2.6.8-4-64_2.6.8-7sarge1_hppa.deb to pool/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-4-64_2.6.8-7sarge1_hppa.deb kernel-headers-2.6.8-4_2.6.8-7sarge1_hppa.deb to pool/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-4_2.6.8-7sarge1_hppa.deb kernel-image-2.6.8-4-32-smp_2.6.8-7sarge1_hppa.deb to pool/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-4-32-smp_2.6.8-7sarge1_hppa.deb kernel-image-2.6.8-4-32_2.6.8-7sarge1_hppa.deb to pool/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-4-32_2.6.8-7sarge1_hppa.deb kernel-image-2.6.8-4-64-smp_2.6.8-7sarge1_hppa.deb to pool/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-4-64-smp_2.6.8-7sarge1_hppa.deb kernel-image-2.6.8-4-64_2.6.8-7sarge1_hppa.deb to pool/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-4-64_2.6.8-7sarge1_hppa.deb kernel-image-2.6.8-hppa_2.6.8-7sarge1.dsc to pool/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-7sarge1.dsc kernel-image-2.6.8-hppa_2.6.8-7sarge1.tar.gz to pool/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-7sarge1.tar.gz