[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted kernel-image-2.4.27-arm 2.4.27-2sarge3 (source arm)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 29 May 2006 17:13:43 -0600
Source: kernel-image-2.4.27-arm
Binary: kernel-headers-2.4.27 kernel-build-2.4.27 kernel-image-2.4.27-bast kernel-image-2.4.27-riscstation kernel-image-2.4.27-riscpc kernel-image-2.4.27-netwinder kernel-image-2.4.27-lart
Architecture: source arm
Version: 2.4.27-2sarge3
Distribution: stable-security
Urgency: high
Maintainer: Vincent Sanders <vince@debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description: 
 kernel-build-2.4.27 - Headers for building modules for Linux 2.4.27
 kernel-headers-2.4.27 - Header files related to Linux kernel version 2.4.27
 kernel-image-2.4.27-bast - Linux kernel image for version 2.4.27 for Bast.
 kernel-image-2.4.27-lart - Linux kernel image for version 2.4.27 for LART.
 kernel-image-2.4.27-netwinder - Linux kernel image for version 2.4.27 for Netwinder.
 kernel-image-2.4.27-riscpc - Linux kernel image for version 2.4.27 for RiscPC.
 kernel-image-2.4.27-riscstation - Linux kernel image for version 2.4.27 for Riscstations.
Changes: 
 kernel-image-2.4.27-arm (2.4.27-2sarge3) stable-security; urgency=high
 .
   * Build against kernel-tree-2.4.27-10sarge3:
     * 207_smbfs-chroot-escape.diff
       [SECURITY] Fix directory traversal vulnerability in smbfs that permits
       local users to escape chroot restrictions
       See CVE-2006-1864
     * 208_ia64-die_if_kernel-returns.diff
       [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by
       an incorrect 'noreturn' attribute on die_if_kernel()
       See CVE-2006-0742
     * 209_sctp-discard-unexpected-in-closed.diff
       [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks
       received in CLOSED state instead of calling BUG()
       See CVE-2006-2271
     * 210_ipv4-id-no-increment.diff
       [SECURITY] Fix vulnerability that allows remote attackers to conduct an
       Idle Scan attack, bypassing intended protections against such attacks
       See CVE-2006-1242
     * 211_usb-gadget-rndis-bufoverflow.diff
       [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation
       that allows for a remote DoS attack (kmalloc'd memory corruption)
       See CVE-2006-1368
     * 212_ipv4-sin_zero_clear.diff
       [SECURITY] Fix local information leak in af_inet code
       See CVE-2006-1343
     * 213_madvise_remove-restrict.diff
       [SECURITY] Fix vulnerability that allows local users to bypass IPC
       permissions and replace portions of read-only tmpfs files with zeroes.
       See CVE-2006-1524
     * 214_mcast-ip-route-null-deref.diff
       [SECURITY] Fix local DoS vulnerability that allows local users to panic
       a system by requesting a route for a multicast IP
       See CVE-2006-1525
     * 215_sctp-fragment-recurse.diff
       [SECURITY] Fix remote DoS vulnerability that can lead to infinite
       recursion when a packet containing two or more DATA fragments is received
       See CVE-2006-2274
     * 216_sctp-fragmented-receive-fix.diff
       [SECURITY] Fix remote DoS vulnerability that allows IP fragmented
       COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic
       See CVE-2006-2272
     * 217_amd64-fp-reg-leak.diff
       [SECURITY][amd64] Fix an information leak that allows a process to see
       a portion of the floating point state of other processes, possibly
       exposing sensitive information.
       See CVE-2006-1056
     * 218_do_add_counters-race.diff
       [SECURITY] Fix race condition in the do_add_counters() function in
       netfilter that allows local users with CAP_NET_ADMIN capabilities to
       read kernel memory
       See CVE-2006-0039
     * 219_sctp-hb-ack-overflow.diff
       [SECURITY] Fix a remote buffer overflow that can result from a badly
       formatted HB-ACK chunk
       See CVE-2006-1857
     * 220_sctp-param-bound-checks.diff
       [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter
       checking code
       See CVE-2006-1858
     * 221_netfilter-do_replace-overflow.diff
       [SECURITY] Fix buffer overflow in netfilter do_replace which can could
       be triggered by users with CAP_NET_ADMIN rights.
       See CVE-2006-0038
     * 222_binfmt-bad-elf-entry-address.diff
       [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf
       code on em64t processors
       See CVE-2006-0741
Files: 
 2f9746e3d73001a774607a2e8460dec8 839 devel optional kernel-image-2.4.27-arm_2.4.27-2sarge3.dsc
 1673537490a1af1a72ff1d65cd73139d 31646 devel optional kernel-image-2.4.27-arm_2.4.27-2sarge3.tar.gz
 b790e6512cd56ac98a1d9b5539c9d5b6 4658994 devel optional kernel-headers-2.4.27_2.4.27-2sarge3_arm.deb
 8ded6d50afd88d04fd9b601586509d32 7331276 base optional kernel-image-2.4.27-netwinder_2.4.27-2sarge3_arm.deb
 a03e9282e21db6a8094c8f2432a88e09 1056874 base optional kernel-image-2.4.27-lart_2.4.27-2sarge3_arm.deb
 2c00f060b5f4a599b1509e5625d766c1 3668438 base optional kernel-image-2.4.27-riscstation_2.4.27-2sarge3_arm.deb
 0e5c53017bbb7a84d554c1b6e60a0f6a 3145470 base optional kernel-image-2.4.27-riscpc_2.4.27-2sarge3_arm.deb
 73cb9319b752cc5eaca4849e20edf6ed 1692044 base optional kernel-image-2.4.27-bast_2.4.27-2sarge3_arm.deb
 61a35d05b6e9617ea9cec7ecc3ada43c 465160 devel optional kernel-build-2.4.27_2.4.27-2sarge3_arm.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEfGUzhuANDBmkLRkRAh0DAKCEcovBBTjZ/dLzPYnXI4oCNWnDywCeMSMT
GmJLOIacYcSdAf4+rJ2thHc=
=PeUW
-----END PGP SIGNATURE-----


Accepted:
kernel-build-2.4.27_2.4.27-2sarge3_arm.deb
  to pool/main/k/kernel-image-2.4.27-arm/kernel-build-2.4.27_2.4.27-2sarge3_arm.deb
kernel-headers-2.4.27_2.4.27-2sarge3_arm.deb
  to pool/main/k/kernel-image-2.4.27-arm/kernel-headers-2.4.27_2.4.27-2sarge3_arm.deb
kernel-image-2.4.27-arm_2.4.27-2sarge3.dsc
  to pool/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge3.dsc
kernel-image-2.4.27-arm_2.4.27-2sarge3.tar.gz
  to pool/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge3.tar.gz
kernel-image-2.4.27-bast_2.4.27-2sarge3_arm.deb
  to pool/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-bast_2.4.27-2sarge3_arm.deb
kernel-image-2.4.27-lart_2.4.27-2sarge3_arm.deb
  to pool/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-lart_2.4.27-2sarge3_arm.deb
kernel-image-2.4.27-netwinder_2.4.27-2sarge3_arm.deb
  to pool/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge3_arm.deb
kernel-image-2.4.27-riscpc_2.4.27-2sarge3_arm.deb
  to pool/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge3_arm.deb
kernel-image-2.4.27-riscstation_2.4.27-2sarge3_arm.deb
  to pool/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge3_arm.deb



Reply to: