-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Tue, 19 Feb 2008 20:34:23 -0700 Source: kernel-image-2.6.8-i386 Binary: kernel-headers-2.6.8-4-686-smp kernel-headers-2.6.8-4-686 kernel-headers-2.6.8-4-386 kernel-image-2.6.8-4-386 kernel-image-2.6.8-4-k7 kernel-image-2.6.8-4-686-smp kernel-headers-2.6.8-4 kernel-image-2.6.8-4-686 kernel-headers-2.6.8-4-k7-smp kernel-image-2.6.8-4-k7-smp kernel-headers-2.6.8-4-k7 Architecture: source i386 Version: 2.6.8-17sarge1 Distribution: oldstable-security Urgency: high Maintainer: Debian kernel team <debian-kernel@lists.debian.org> Changed-By: dann frazier <dannf@debian.org> Description: kernel-headers-2.6.8-4 - Header files related to Linux kernel version 2.6.8 kernel-headers-2.6.8-4-386 - Linux kernel headers 2.6.8 on 386 kernel-headers-2.6.8-4-686 - Linux kernel headers 2.6.8 on PPro/Celeron/PII/PIII/P4 kernel-headers-2.6.8-4-686-smp - Linux kernel headers 2.6.8 on PPro/Celeron/PII/PIII/P4 SMP kernel-headers-2.6.8-4-k7 - Linux kernel headers 2.6.8 on AMD K7 kernel-headers-2.6.8-4-k7-smp - Linux kernel headers 2.6.8 on AMD K7 SMP kernel-image-2.6.8-4-386 - Linux kernel image for version 2.6.8 on 386. kernel-image-2.6.8-4-686 - Linux kernel image for version 2.6.8 on PPro/Celeron/PII/PIII/P4. kernel-image-2.6.8-4-686-smp - Linux kernel image for version 2.6.8 on PPro/Celeron/PII/PIII/P4 kernel-image-2.6.8-4-k7 - Linux kernel image for version 2.6.8 on AMD K7. kernel-image-2.6.8-4-k7-smp - Linux kernel image for version 2.6.8 on AMD K7 SMP. Changes: kernel-image-2.6.8-i386 (2.6.8-17sarge1) oldstable-security; urgency=high . * Rebuild against kernel-tree-2.6.8-17sarge1 * compat_sys_mount-NULL-data_page.dpatch [SECURITY] Fix oops in compat_sys_mount triggered by NULL data_page See CVE-2006-7203 * pppoe-socket-release-mem-leak.dpatch [SECURITY] fix unpriveleged memory leak when a PPPoE socket is released after connect but before PPPIOCGCHAN ioctl is called upon it See CVE-2007-2525 * dn_fib-out-of-bounds.dpatch, ipv4-fib_props-out-of-bounds.dpatch [SECURITY] Fix out of bounds condition in dn_fib_props[] See CVE-2007-2172 * aacraid-ioctl-perm-check.dpatch [SECURITY] Require admin capabilities to issue ioctls to aacraid devices See CVE-2007-4308 * reset-pdeathsig-on-suid.dpatch [SECURITY] Fix potential privilege escalation caused by improper clearing of the child process' pdeath signal. See CVE-2007-3848 * bluetooth-l2cap-hci-info-leaks.dpatch [SECURITY] Fix information leaks in setsockopt() implementations See CVE-2007-1353 * coredump-only-to-same-uid.dpatch [SECURITY] Fix an issue where core dumping over a file that already exists retains the ownership of the original file See CVE-2007-6206 * i4l-isdn_ioctl-mem-overrun.dpatch [SECURITY] Fix potential isdn ioctl memory overrun See CVE-2007-6151 * cramfs-check-block-length.dpatch [SECURITY] Add a sanity check of the block length in cramfs_readpage to avoid a potential oops condition See CVE-2006-5823 * ext2-skip-pages-past-num-blocks.dpatch [SECURITY] Add some sanity checking for a corrupted i_size in ext2_find_entry() See CVE-2006-6054 * minixfs-printk-hang.dpatch [SECURITY] Rate-limit printks caused by accessing a corrupted minixfs filesystem that would otherwise cause a system to hang (printk storm) See CVE-2006-6058 * isdn-net-overflow.dpatch [SECURITY] Fix potential overflows in the ISDN subsystem See CVE-2007-6063 * prevent-stack-growth-into-hugetlb-region.dpatch [SECURITY] Prevent OOPS during stack expansion when the VMA crosses into address space reserved for hugetlb pages. See CVE-2007-3739 * cifs-honor-umask.dpatch [SECURITY] Make CIFS honor a process' umask See CVE-2007-3740 * hugetlb-prio_tree-unit-fix.dpatch [SECURITY] Fix misconversion of hugetlb_vmtruncate_list to prio_tree which could be used to trigger a BUG_ON() call in exit_mmap. See CVE-2007-4133 * amd64-zero-extend-32bit-ptrace.dpatch [SECURITY] Zero extend all registers after ptrace in 32-bit entry path. See CVE-2007-4573 * usb-pwc-disconnect-block.dpatch [SECURITY] Fix issue with unplugging webcams that use the pwc driver. If userspace still has the device open it can result, the driver would wait for the device to close, blocking the USB subsystem. See CVE-2007-5093 * powerpc-chrp-null-deref.dpatch [SECURITY][powerpc] Fix NULL pointer dereference if get_property fails on the subarchitecture See CVE-2007-6694 * random-bound-check-ordering.dpatch [SECURITY] Fix stack-based buffer overflow in the random number generator See CVE-2007-3105 * mmap-VM_DONTEXPAND.dpatch [SECURITY] Add VM_DONTEXPAND to vm_flags in drivers that register a fault handler but do not bounds check the offset argument See CVE-2008-0007 Files: 80bb021a47b74d6b1e486c2bba6c55b8 1047 devel optional kernel-image-2.6.8-i386_2.6.8-17sarge1.dsc bd4d726f97468d6cca1139cf80b1342a 96384 devel optional kernel-image-2.6.8-i386_2.6.8-17sarge1.tar.gz 76f4162d37d785b5e0648435936774f6 2784978 devel optional kernel-headers-2.6.8-4_2.6.8-17sarge1_i386.deb a4765a3da36be625c104281daecc29d2 260930 devel optional kernel-headers-2.6.8-4-686_2.6.8-17sarge1_i386.deb 1ef83fe26c46d25f209cb0a76140c0e3 15558172 base optional kernel-image-2.6.8-4-686_2.6.8-17sarge1_i386.deb b406cff5cdfce0b1ebb0999b940bcf77 258700 devel optional kernel-headers-2.6.8-4-k7-smp_2.6.8-17sarge1_i386.deb f477356acda36ec633c3bee285794377 15173410 base optional kernel-image-2.6.8-4-k7-smp_2.6.8-17sarge1_i386.deb e02e548b571117fa3a0b68add40c3893 258222 devel optional kernel-headers-2.6.8-4-686-smp_2.6.8-17sarge1_i386.deb 580feea340f69d04fafcd052268bb314 15397692 base optional kernel-image-2.6.8-4-686-smp_2.6.8-17sarge1_i386.deb 5bf06a1619132b0624299735caf26879 260956 devel optional kernel-headers-2.6.8-4-k7_2.6.8-17sarge1_i386.deb bce3bfbc0e6aede5dc503b37935b050a 15282426 base optional kernel-image-2.6.8-4-k7_2.6.8-17sarge1_i386.deb 3ddcc23d88f64f8a185c3a3dc4ae3402 263456 devel optional kernel-headers-2.6.8-4-386_2.6.8-17sarge1_i386.deb b3034d3d756026061d6d1ae64f7670ac 14079400 base optional kernel-image-2.6.8-4-386_2.6.8-17sarge1_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHvNlahuANDBmkLRkRAmTJAJwOvjlrXALZiNHC87yeglcvVR/prACffbuY kaAk2SpWu2xwsKT6HKBcDco= =OkAS -----END PGP SIGNATURE----- Accepted: kernel-headers-2.6.8-4-386_2.6.8-17sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4-386_2.6.8-17sarge1_i386.deb kernel-headers-2.6.8-4-686-smp_2.6.8-17sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4-686-smp_2.6.8-17sarge1_i386.deb kernel-headers-2.6.8-4-686_2.6.8-17sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4-686_2.6.8-17sarge1_i386.deb kernel-headers-2.6.8-4-k7-smp_2.6.8-17sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4-k7-smp_2.6.8-17sarge1_i386.deb kernel-headers-2.6.8-4-k7_2.6.8-17sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4-k7_2.6.8-17sarge1_i386.deb kernel-headers-2.6.8-4_2.6.8-17sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4_2.6.8-17sarge1_i386.deb kernel-image-2.6.8-4-386_2.6.8-17sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-4-386_2.6.8-17sarge1_i386.deb kernel-image-2.6.8-4-686-smp_2.6.8-17sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-4-686-smp_2.6.8-17sarge1_i386.deb kernel-image-2.6.8-4-686_2.6.8-17sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-4-686_2.6.8-17sarge1_i386.deb kernel-image-2.6.8-4-k7-smp_2.6.8-17sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-4-k7-smp_2.6.8-17sarge1_i386.deb kernel-image-2.6.8-4-k7_2.6.8-17sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-4-k7_2.6.8-17sarge1_i386.deb kernel-image-2.6.8-i386_2.6.8-17sarge1.dsc to pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-17sarge1.dsc kernel-image-2.6.8-i386_2.6.8-17sarge1.tar.gz to pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-17sarge1.tar.gz