-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Mon, 4 Dec 2006 19:11:05 -0700 Source: kernel-source-2.6.8 Binary: kernel-source-2.6.8 kernel-doc-2.6.8 kernel-tree-2.6.8 kernel-patch-debian-2.6.8 Architecture: source all Version: 2.6.8-16sarge6 Distribution: stable-security Urgency: high Maintainer: Debian kernel team <debian-kernel@lists.debian.org> Changed-By: dann frazier <dannf@debian.org> Description: kernel-doc-2.6.8 - Linux kernel specific documentation for version 2.6.8 kernel-patch-debian-2.6.8 - Debian patches to Linux 2.6.8 kernel-source-2.6.8 - Linux kernel source for version 2.6.8 with Debian patches kernel-tree-2.6.8 - Linux kernel source tree for building Debian kernel images Changes: kernel-source-2.6.8 (2.6.8-16sarge6) stable-security; urgency=high . * perfmon-fd-refcnt.dpatch [SECURITY][ia64] Fix file descriptor leak in perfmonctl system call which could be used as a local denial of service attack by depleting the system of file descriptors See CVE-2006-3741 * ia64-sparc-cross-region-mappings.dpatch [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * __block_prepare_write-recovery.dpatch [SECURITY] Fix an information leak in __block_prepare_write() See CVE-2006-4813 * atm-clip-freed-skb-deref.dpatch [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * ip6_flowlabel-lockup.dpatch [SECURITY] Fix local DoS attack vector (lockups, oopses) in the sequence handling for /proc/net/ip6_flowlabel See CVE-2006-5619 * ppc-alignment-exception-table-check.dpatch [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * s390-uaccess-memleak.dpatch [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * smbfs-honor-mount-opts.dpatch Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled See CVE-2006-5871 * bridge-get_fdb_entries-overflow.dpatch Protect against possible overflow in get_fdb_entries See CVE-2006-5751 Files: 9e5b12cb1d4c98cddc88e5c36bf7d951 1002 devel optional kernel-source-2.6.8_2.6.8-16sarge6.dsc 1d83d174a3b2f5e6b03bcbf53c4d877f 1067572 devel optional kernel-source-2.6.8_2.6.8-16sarge6.diff.gz 3156984be3fc859f717a4253bd0ea462 1116726 devel optional kernel-patch-debian-2.6.8_2.6.8-16sarge6_all.deb 4b4ecbf67cb066043d0d9447b5238d28 34943318 devel optional kernel-source-2.6.8_2.6.8-16sarge6_all.deb 67ed3f0138673fdf06494239a3531972 36670 devel optional kernel-tree-2.6.8_2.6.8-16sarge6_all.deb 9c16bf9ab5f0ecf6551812f3e0e693ac 6192778 doc optional kernel-doc-2.6.8_2.6.8-16sarge6_all.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFFeD1ihuANDBmkLRkRApT4AJ9PF9bvJg0k4bqewXJy2YiaXjlvrwCdFkxh d5PfuGnQwPk9BkwbXg13vyw= =GkYB -----END PGP SIGNATURE----- Accepted: kernel-doc-2.6.8_2.6.8-16sarge6_all.deb to pool/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge6_all.deb kernel-patch-debian-2.6.8_2.6.8-16sarge6_all.deb to pool/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge6_all.deb kernel-source-2.6.8_2.6.8-16sarge6.diff.gz to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge6.diff.gz kernel-source-2.6.8_2.6.8-16sarge6.dsc to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge6.dsc kernel-source-2.6.8_2.6.8-16sarge6_all.deb to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge6_all.deb kernel-tree-2.6.8_2.6.8-16sarge6_all.deb to pool/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge6_all.deb