Your message dated Mon, 17 Jul 2006 16:29:54 +0200
with message-id <[EMAIL PROTECTED]>
and subject line Accepted linux-2.6 2.6.17-4 (source all powerpc)
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: linux-image-2.6.17
Severity: critical

0day root exploit for kernel 2.6.17.4 available, bug is fixed in 2.6.17.5 -
please update Debian packages

Exploit:
http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047907.html
Changelog:  http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.6
New Kernel: http://www.kernel.org/pub/linux/kernel/v2.6/patch-2.6.17.6.bz2

Thanks in advance,
Jan Gerle


--- End Message ---
--- Begin Message ---
Version: 2.6.17-4

Format: 1.7
Date: Mon, 17 Jul 2006 11:08:41 +0200
Source: linux-2.6
Binary: linux-image-2.6-vserver-amd64-k8 linux-image-2.6.17-1-486 
linux-image-2.6-powerpc-miboot linux-headers-2.6.17-1-itanium 
linux-image-2.6-footbridge linux-image-2.6.17-1-r5k-ip32 
linux-headers-2.6.17-1-686 linux-image-2.6-parisc64 
linux-image-2.6.17-1-powerpc kernel-image-2.6-686-smp 
linux-image-2.6.17-1-em64t-p4-smp kernel-image-2.6-386 linux-headers-2.6-s390 
linux-headers-2.6-nslu2 linux-headers-2.6.17-1-r3k-kn02 
linux-headers-2.6.17-1-all-alpha linux-image-2.6-s390 
linux-image-2.6-sb1a-bcm91480b kernel-image-2.6-itanium-smp 
linux-image-2.6.17-1-686 linux-image-2.6-r5k-cobalt kernel-image-2.6-k7-smp 
linux-image-2.6.17-1-alpha-legacy linux-image-r5k-ip32 linux-image-2.6.17-1-k7 
linux-headers-2.6-powerpc-miboot linux-image-2.6.17-1-parisc 
linux-headers-2.6-r5k-cobalt linux-headers-2.6.17-1-parisc64-smp 
linux-image-nslu2 linux-image-2.6-itanium linux-image-amd64-k8-smp 
linux-image-2.6-parisc-smp linux-headers-2.6-vserver-em64t-p4 
linux-image-2.6.17-1-r4k-ip22 linux-headers-2.6.17-1-s3c2410 
linux-image-sparc32 linux-image-amiga linux-image-2.6-k7 
linux-headers-2.6.17-1-k7 linux-headers-2.6.17-1-s390 
linux-headers-2.6-sb1-bcm91250a linux-image-em64t-p4-smp 
linux-image-2.6-powerpc linux-headers-2.6.17-1-parisc-smp 
linux-headers-2.6.17-1-r5k-cobalt kernel-image-2.6-mckinley 
linux-image-powerpc-smp kernel-image-2.6-power3 linux-support-2.6.17-1 
linux-headers-2.6.17-1-vserver-em64t-p4 linux-image-2.6.17-1-sparc32 
linux-image-2.6.17-1-s390 linux-image-sb1a-bcm91480b 
linux-image-2.6-sb1-bcm91250a linux-headers-2.6.17-1-alpha-generic 
kernel-image-2.6-generic linux-headers-2.6-amd64-k8-smp 
linux-headers-2.6.17-1-vserver-k7 linux-headers-2.6.17-1-all-amd64 
linux-headers-2.6.17-1-ixp4xx linux-headers-2.6.17-1-all 
linux-headers-2.6-powerpc linux-headers-2.6-sparc64 linux-headers-2.6-powerpc64 
linux-image-2.6.17-1-powerpc-smp linux-headers-2.6.17-1-rpc 
linux-headers-2.6.17-1-powerpc-miboot linux-headers-2.6.17-1-footbridge 
linux-headers-2.6.17-1-r4k-kn04 linux-image-2.6.17-1-ixp4xx 
linux-headers-2.6.17-1-all-ia64 linux-headers-2.6-em64t-p4 linux-tree-2.6.17 
linux-headers-2.6.17-1-powerpc64 linux-image-vserver-686 linux-image-s3c2410 
linux-headers-2.6-vserver-k7 linux-image-2.6-vserver-s390x 
kernel-image-2.6-power4-smp linux-image-2.6.17-1-alpha-generic 
linux-headers-2.6.17-1 linux-image-vserver-k7 
linux-image-2.6.17-1-vserver-em64t-p4 linux-image-2.6-sparc32 
linux-headers-2.6.17-1-s390x linux-headers-2.6.17-1-vserver-powerpc64 
linux-headers-2.6.17-1-mckinley linux-image-2.6-parisc linux-image-mckinley 
linux-image-2.6-alpha-legacy linux-image-2.6-sparc64-smp 
linux-headers-2.6-parisc linux-image-2.6-ixp4xx linux-image-2.6-vserver-686 
linux-image-2.6.17-1-s3c2410 kernel-image-2.6-k7 linux-image-ixp4xx 
linux-image-rpc linux-image-2.6-mac kernel-image-2.6-power3-smp 
linux-image-2.6.17-1-r3k-kn02 linux-image-r5k-cobalt linux-image-2.6-s390x 
linux-image-vserver-s390x linux-headers-2.6-sparc32 linux-image-2.6-amd64-k8 
linux-headers-2.6.17-1-vserver-amd64-k8 linux-image-2.6-r3k-kn02 
linux-image-2.6-sparc64 linux-image-amd64-k8 linux-image-2.6.17-1-nslu2 
linux-headers-2.6.17-1-all-powerpc kernel-image-power4 linux-image-2.6-686-smp 
linux-image-em64t-p4 linux-image-2.6-vserver-em64t-p4 
linux-image-2.6-vserver-k7 linux-image-2.6-alpha-smp 
linux-headers-2.6.17-1-alpha-smp linux-image-686 linux-image-2.6.17-1-s390x 
linux-image-alpha-generic linux-image-s390x linux-image-486 
linux-headers-2.6-amiga kernel-image-power3 linux-image-2.6-powerpc64 
linux-headers-2.6-parisc-smp kernel-image-power4-smp linux-headers-2.6-486 
kernel-image-2.6-sparc64 linux-headers-2.6.17-1-parisc kernel-image-2.6-itanium 
linux-headers-2.6.17-1-alpha-legacy linux-headers-2.6.17-1-nslu2 
linux-image-sparc64 linux-image-2.6-em64t-p4-smp linux-headers-2.6-itanium 
linux-image-2.6-686 linux-image-2.6.17-1-sparc64-smp 
linux-headers-2.6.17-1-all-arm linux-image-2.6-amd64-generic 
linux-image-2.6.17-1-mckinley linux-image-2.6-486 linux-headers-2.6-vserver-686 
linux-headers-2.6.17-1-all-sparc linux-image-2.6.17-1-parisc-smp 
linux-headers-2.6-vserver-amd64-k8 linux-image-2.6-amd64-k8-smp 
linux-image-itanium linux-image-2.6-rpc linux-headers-2.6-r4k-kn04 
linux-headers-2.6.17-1-powerpc linux-image-2.6.17-1-powerpc-miboot 
linux-headers-2.6-sparc64-smp linux-image-footbridge 
linux-image-2.6.17-1-vserver-686 linux-image-2.6.17-1-amd64-k8-smp 
linux-image-2.6.17-1-mac linux-image-2.6.17-1-vserver-powerpc 
linux-image-2.6.17-1-amiga linux-headers-2.6.17-1-r5k-ip32 
linux-image-2.6.17-1-sb1a-bcm91480b linux-image-2.6.17-1-s390-tape 
linux-image-alpha-legacy linux-image-r3k-kn02 linux-headers-2.6.17-1-em64t-p4 
linux-image-2.6-r4k-ip22 linux-headers-2.6.17-1-sb1a-bcm91480b 
linux-headers-2.6.17-1-all-mipsel linux-image-2.6.17-1-amd64-k8 
linux-image-s390 linux-headers-2.6-r5k-ip32 linux-image-parisc-smp 
linux-headers-2.6.17-1-all-s390 linux-headers-2.6.17-1-vserver-powerpc 
linux-headers-2.6.17-1-all-i386 linux-image-2.6-vserver-powerpc64 
linux-image-2.6.17-1-r4k-kn04 linux-image-2.6-mckinley-smp 
linux-headers-2.6-s3c2410 linux-image-parisc64-smp 
linux-image-2.6.17-1-sb1-bcm91250a linux-manual-2.6.17 linux-image-sparc64-smp 
linux-headers-2.6-parisc64-smp linux-image-2.6-parisc64-smp 
kernel-image-2.6-powerpc linux-image-2.6-alpha-generic linux-image-2.6-em64t-p4 
linux-image-r4k-kn04 linux-image-2.6.17-1-sparc64 
linux-headers-2.6-em64t-p4-smp kernel-image-powerpc-smp linux-image-powerpc64 
linux-image-2.6.17-1-parisc64-smp linux-image-vserver-powerpc 
linux-headers-2.6.17-1-amd64-k8 linux-image-vserver-powerpc64 
linux-image-2.6-nslu2 linux-headers-2.6-mac linux-headers-2.6.17-1-all-hppa 
linux-headers-2.6-rpc linux-headers-2.6.17-1-all-m68k linux-image-2.6-mckinley 
linux-headers-2.6.17-1-r4k-ip22 linux-headers-2.6.17-1-all-mips 
linux-headers-2.6-vserver-powerpc linux-headers-2.6-alpha-generic 
linux-image-r4k-ip22 kernel-image-2.6-sparc64-smp kernel-image-powerpc 
linux-headers-2.6-alpha-smp linux-image-2.6.17-1-alpha-smp 
linux-headers-2.6.17-1-486 linux-image-2.6.17-1-parisc64 
linux-image-2.6.17-1-vserver-amd64-k8 linux-headers-2.6.17-1-sparc64 
linux-headers-2.6.17-1-vserver linux-headers-2.6-sb1a-bcm91480b 
linux-image-2.6.17-1-vserver-powerpc64 linux-image-parisc64 
linux-headers-2.6.17-1-sparc64-smp linux-headers-2.6.17-1-sparc32 
kernel-image-power3-smp linux-image-2.6-r4k-kn04 linux-image-2.6-s390-tape 
linux-patch-debian-2.6.17 linux-headers-2.6-s390x linux-image-sb1-bcm91250a 
linux-headers-2.6-vserver-powerpc64 linux-image-2.6-vserver-powerpc 
linux-image-2.6.17-1-footbridge kernel-image-2.6-smp linux-image-alpha-smp 
linux-image-parisc linux-headers-2.6-footbridge 
linux-headers-2.6.17-1-sb1-bcm91250a linux-image-s390-tape 
linux-headers-2.6.17-1-vserver-686 linux-headers-2.6.17-1-parisc64 
linux-image-2.6-s3c2410 linux-headers-2.6-alpha-legacy 
linux-headers-2.6-mckinley linux-headers-2.6-ixp4xx 
linux-headers-2.6.17-1-powerpc-smp linux-image-powerpc-miboot 
linux-headers-2.6.17-1-vserver-s390x linux-headers-2.6.17-1-em64t-p4-smp 
linux-image-vserver-em64t-p4 linux-headers-2.6-k7 
linux-headers-2.6.17-1-amd64-k8-smp linux-image-k7 linux-image-2.6-powerpc-smp 
linux-source-2.6.17 linux-headers-2.6-686 linux-image-2.6.17-1-rpc 
linux-image-2.6-itanium-smp kernel-image-2.6-powerpc-smp linux-image-2.6-amiga 
linux-headers-2.6-r3k-kn02 linux-image-2.6.17-1-vserver-k7 
kernel-image-2.6-s390x linux-image-powerpc linux-image-2.6.17-1-em64t-p4 
linux-headers-2.6.17-1-amiga kernel-image-2.6-mckinley-smp 
linux-headers-2.6-parisc64 linux-doc-2.6.17 linux-image-2.6-r5k-ip32 
linux-headers-2.6-amd64-k8 linux-image-2.6.17-1-powerpc64 linux-image-mac 
kernel-image-2.6-power4 linux-image-2.6.17-1-itanium linux-headers-2.6-r4k-ip22 
linux-image-2.6.17-1-r5k-cobalt linux-headers-2.6.17-1-all-armeb 
linux-image-vserver-amd64-k8 linux-image-2.6-k7-smp 
linux-headers-2.6-powerpc-smp linux-headers-2.6-vserver-s390x 
linux-image-2.6.17-1-vserver-s390x kernel-image-2.6-s390 
linux-headers-2.6.17-1-mac kernel-image-2.6-686
Architecture: source powerpc all
Version: 2.6.17-4
Distribution: unstable
Urgency: low
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Bastian Blank <[EMAIL PROTECTED]>
Description: 
...
Changes: 
 linux-2.6 (2.6.17-4) unstable; urgency=low
 .
   [ Bastian Blank ]
   * Add stable release 2.6.17.5:
     - Fix nasty /proc vulnerability (CVE-2006-3626)
   * Add stable release 2.6.17.6:
     - Relax /proc fix a bit
   * Set section of images to admin.
 .
   [ dann frazier ]
   * [ia64] Drop the non-SMP flavours; they are not well maintained upstream.
     Note that the non-SMP flavours have been identical to the SMP builds
     since 2.6.13-1; this was to avoid having to drop then re-add these
     flavours if upstream resolved the issue - but that never happened.
     Note that this is a measurable performance penalty on non-SMP systems.

-- 
Martin Michlmayr
http://www.cyrius.com/

--- End Message ---

Reply via email to