[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted kernel-source-2.4.27 2.4.27-10sarge3 (source all)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 29 May 2006 02:27:17 -0600
Source: kernel-source-2.4.27
Binary: kernel-tree-2.4.27 kernel-source-2.4.27 kernel-patch-debian-2.4.27 kernel-doc-2.4.27
Architecture: source all
Version: 2.4.27-10sarge3
Distribution: stable-security
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description: 
 kernel-doc-2.4.27 - Linux kernel specific documentation for version 2.4.27
 kernel-patch-debian-2.4.27 - Debian patches to Linux 2.4.27
 kernel-source-2.4.27 - Linux kernel source for version 2.4.27 with Debian patches
 kernel-tree-2.4.27 - Linux kernel source tree for building Debian kernel images
Changes: 
 kernel-source-2.4.27 (2.4.27-10sarge3) stable-security; urgency=high
 .
   * 207_smbfs-chroot-escape.diff
     [SECURITY] Fix directory traversal vulnerability in smbfs that permits
     local users to escape chroot restrictions
     See CVE-2006-1864
   * 208_ia64-die_if_kernel-returns.diff
     [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by
     an incorrect 'noreturn' attribute on die_if_kernel()
     See CVE-2006-0742
   * 209_sctp-discard-unexpected-in-closed.diff
     [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks
     received in CLOSED state instead of calling BUG()
     See CVE-2006-2271
   * 210_ipv4-id-no-increment.diff
     [SECURITY] Fix vulnerability that allows remote attackers to conduct an
     Idle Scan attack, bypassing intended protections against such attacks
     See CVE-2006-1242
   * 211_usb-gadget-rndis-bufoverflow.diff
     [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that
     allows for a remote DoS attack (kmalloc'd memory corruption)
     See CVE-2006-1368
   * 212_ipv4-sin_zero_clear.diff
     [SECURITY] Fix local information leak in af_inet code
     See CVE-2006-1343
   * 213_madvise_remove-restrict.diff
     [SECURITY] Fix vulnerability that allows local users to bypass IPC
     permissions and replace portions of read-only tmpfs files with zeroes.
     See CVE-2006-1524
   * 214_mcast-ip-route-null-deref.diff
     [SECURITY] Fix local DoS vulnerability that allows local users to panic
     a system by requesting a route for a multicast IP
     See CVE-2006-1525
   * 215_sctp-fragment-recurse.diff
     [SECURITY] Fix remote DoS vulnerability that can lead to infinite recursion
     when a packet containing two or more DATA fragments is received
     See CVE-2006-2274
   * 216_sctp-fragmented-receive-fix.diff
     [SECURITY] Fix remote DoS vulnerability that allows IP fragmented
     COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic
     See CVE-2006-2272
   * 217_amd64-fp-reg-leak.diff
     [SECURITY][amd64] Fix an information leak that allows a process to see
     a portion of the floating point state of other processes, possibly exposing
     sensitive information.
     See CVE-2006-1056
   * 218_do_add_counters-race.diff
     [SECURITY] Fix race condition in the do_add_counters() function in
     netfilter that allows local users with CAP_NET_ADMIN capabilities to
     read kernel memory
     See CVE-2006-0039
   * 219_sctp-hb-ack-overflow.diff
     [SECURITY] Fix a remote buffer overflow that can result from a badly
     formatted HB-ACK chunk
     See CVE-2006-1857
   * 220_sctp-param-bound-checks.diff
     [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter
     checking code
     See CVE-2006-1858
   * 221_netfilter-do_replace-overflow.diff
     [SECURITY] Fix buffer overflow in netfilter do_replace which can could
     be triggered by users with CAP_NET_ADMIN rights.
     See CVE-2006-0038
   * 222_binfmt-bad-elf-entry-address.diff
     [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf
     code on em64t processors
     See CVE-2006-0741
Files: 
 6a5fd70b803f4a0996b994d72d30c65e 900 devel optional kernel-source-2.4.27_2.4.27-10sarge3.dsc
 dc1085a42970fbb6f5174f8dae7f5bb2 741011 devel optional kernel-source-2.4.27_2.4.27-10sarge3.diff.gz
 9054c12e58f6b8c6d7f6055e94e3e2b3 689772 devel optional kernel-patch-debian-2.4.27_2.4.27-10sarge3_all.deb
 9542a6368e1668c0b3dd5529ba9c80f0 3580108 doc optional kernel-doc-2.4.27_2.4.27-10sarge3_all.deb
 47eb2bd29ad34555156eac2ec8160cd4 31033502 devel optional kernel-source-2.4.27_2.4.27-10sarge3_all.deb
 88c43bac04065e47b6486bed94692e9e 26664 devel optional kernel-tree-2.4.27_2.4.27-10sarge3_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEe31AhuANDBmkLRkRAkWoAJ9y8UM21NyenCsi9v0bG0uRWNZniwCeNOQ5
33DCPQctyhX80aeVh5b/rE8=
=VOWZ
-----END PGP SIGNATURE-----


Accepted:
kernel-doc-2.4.27_2.4.27-10sarge3_all.deb
  to pool/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge3_all.deb
kernel-patch-debian-2.4.27_2.4.27-10sarge3_all.deb
  to pool/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge3_all.deb
kernel-source-2.4.27_2.4.27-10sarge3.diff.gz
  to pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge3.diff.gz
kernel-source-2.4.27_2.4.27-10sarge3.dsc
  to pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge3.dsc
kernel-source-2.4.27_2.4.27-10sarge3_all.deb
  to pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge3_all.deb
kernel-tree-2.4.27_2.4.27-10sarge3_all.deb
  to pool/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge3_all.deb



Reply to: