-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue,  5 Dec 2006 02:21:54 -0700
Source: kernel-image-2.6.8-sparc
Binary: kernel-build-2.6.8-3 kernel-image-2.6.8-3-sparc32 
kernel-image-2.6.8-3-sparc64 kernel-headers-2.6.8-3-sparc64 
kernel-headers-2.6.8-3-sparc32 kernel-headers-2.6.8-3-sparc64-smp 
kernel-image-2.6.8-3-sparc64-smp kernel-headers-2.6.8-3
Architecture: source sparc 
Version: 2.6.8-15sarge6
Distribution: stable-security
Urgency: high
Maintainer: Debian Kernel Team <[email protected]>
Changed-By: dann frazier <[EMAIL PROTECTED]>
Description: 
 kernel-build-2.6.8-3 - Headers for building modules for Linux 2.6.8
 kernel-headers-2.6.8-3 - Header files related to Linux kernel version 2.6.8
 kernel-headers-2.6.8-3-sparc32 - Header files for Linux kernel 2.6.8 on 
uniprocessor 32-bit SPARC
 kernel-headers-2.6.8-3-sparc64 - Header files for Linux kernel 2.6.8 on 
uniprocessor 64-bit SPARC
 kernel-headers-2.6.8-3-sparc64-smp - Header files for Linux kernel 2.6.8 on 
multiprocessor 64-bit SPAR
 kernel-image-2.6.8-3-sparc32 - Linux kernel binary image for Super/HyperSPARC 
(sparc32) systems
 kernel-image-2.6.8-3-sparc64 - Linux kernel binary image for UltraSPARC 
(sparc64) systems
 kernel-image-2.6.8-3-sparc64-smp - Linux kernel binary image for SMP 
UltraSPARC (sparc64) systems
Changes: 
 kernel-image-2.6.8-sparc (2.6.8-15sarge6) stable-security; urgency=high
 .
   * Build against kernel-tree-2.6.8-16sarge6:
     * perfmon-fd-refcnt.dpatch
       [SECURITY][ia64] Fix file descriptor leak in perfmonctl
       system call which could be used as a local denial of service attack
       by depleting the system of file descriptors
       See CVE-2006-3741
     * ia64-sparc-cross-region-mappings.dpatch
       [SECURITY] Prevent cross-region mappings on ia64 and sparc which
       could be used in a local DoS attack (system crash)
       See CVE-2006-4538
     * __block_prepare_write-recovery.dpatch
       [SECURITY] Fix an information leak in __block_prepare_write()
       See CVE-2006-4813
     * atm-clip-freed-skb-deref.dpatch
       [SECURITY] Avoid dereferencing an already freed skb, preventing a
       potential remote DoS (system crash) vector
       See CVE-2006-4997
     * ip6_flowlabel-lockup.dpatch
       [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
       sequence handling for /proc/net/ip6_flowlabel
       See CVE-2006-5619
     * ppc-alignment-exception-table-check.dpatch
       [SECURITY][ppc] Avoid potential DoS which can be triggered by some
       futex ops
       See CVE-2006-5649
     * s390-uaccess-memleak.dpatch
       [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
       remaining bytes of the kernel buffer after a fault on the userspace
       address in copy_from_user()
       See CVE-2006-5174
     * smbfs-honor-mount-opts.dpatch
       Honor uid, gid and mode mount options for smbfs even when unix extensions
       are enabled
       See CVE-2006-5871
     * bridge-get_fdb_entries-overflow.dpatch
       Protect against possible overflow in get_fdb_entries
       See CVE-2006-5751
Files: 
 2e8d6bb2402f6eae4ca1c7d84fc038e5 4556682 base optional 
kernel-image-2.6.8-3-sparc32_2.6.8-15sarge6_sparc.deb
 3ba6d4524ee7f978629105f03a6cb888 147416 devel optional 
kernel-headers-2.6.8-3-sparc64-smp_2.6.8-15sarge6_sparc.deb
 47217a4688947b3541b160442c67c4e3 111930 devel optional 
kernel-headers-2.6.8-3-sparc32_2.6.8-15sarge6_sparc.deb
 80f27150809880437b8eea7cdacf86aa 6914 devel optional 
kernel-build-2.6.8-3_2.6.8-15sarge6_sparc.deb
 97ea4b531b25d0184afe15bcf048dd61 7638170 base optional 
kernel-image-2.6.8-3-sparc64-smp_2.6.8-15sarge6_sparc.deb
 ad82ebcd955994cf9ba0a888665f7bc3 7436722 base optional 
kernel-image-2.6.8-3-sparc64_2.6.8-15sarge6_sparc.deb
 12556f5dfc700f91c58312c425df72e6 1036 devel optional 
kernel-image-2.6.8-sparc_2.6.8-15sarge6.dsc
 d07e30138d6fb6f17664baaba77c2ac5 28517 devel optional 
kernel-image-2.6.8-sparc_2.6.8-15sarge6.tar.gz
 f7175f6a595c089d70cdcbc53da66741 146746 devel optional 
kernel-headers-2.6.8-3-sparc64_2.6.8-15sarge6_sparc.deb
 fe5a212dc746cb2cd3b6f89cd3ec0910 2892460 devel optional 
kernel-headers-2.6.8-3_2.6.8-15sarge6_sparc.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFeE/whuANDBmkLRkRAiOEAJ9Y4Mapj1Fob2SkokNVkJqHOi2MzQCgkEdN
L43pfLKgy+Ob/vZL1Vms7jM=
=gZca
-----END PGP SIGNATURE-----


Accepted:
kernel-build-2.6.8-3_2.6.8-15sarge6_sparc.deb
  to 
pool/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-3_2.6.8-15sarge6_sparc.deb
kernel-headers-2.6.8-3-sparc32_2.6.8-15sarge6_sparc.deb
  to 
pool/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc32_2.6.8-15sarge6_sparc.deb
kernel-headers-2.6.8-3-sparc64-smp_2.6.8-15sarge6_sparc.deb
  to 
pool/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64-smp_2.6.8-15sarge6_sparc.deb
kernel-headers-2.6.8-3-sparc64_2.6.8-15sarge6_sparc.deb
  to 
pool/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64_2.6.8-15sarge6_sparc.deb
kernel-headers-2.6.8-3_2.6.8-15sarge6_sparc.deb
  to 
pool/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3_2.6.8-15sarge6_sparc.deb
kernel-image-2.6.8-3-sparc32_2.6.8-15sarge6_sparc.deb
  to 
pool/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc32_2.6.8-15sarge6_sparc.deb
kernel-image-2.6.8-3-sparc64-smp_2.6.8-15sarge6_sparc.deb
  to 
pool/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64-smp_2.6.8-15sarge6_sparc.deb
kernel-image-2.6.8-3-sparc64_2.6.8-15sarge6_sparc.deb
  to 
pool/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64_2.6.8-15sarge6_sparc.deb
kernel-image-2.6.8-sparc_2.6.8-15sarge6.dsc
  to 
pool/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge6.dsc
kernel-image-2.6.8-sparc_2.6.8-15sarge6.tar.gz
  to 
pool/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge6.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to