Accepted kernel-image-2.4.27-sparc 2.4.27-9sarge3 (source sparc)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Thu, 1 Jun 2006 23:16:20 -0600
Source: kernel-image-2.4.27-sparc
Binary: kernel-image-2.4.27-3-sparc64 kernel-image-2.4.27-3-sparc64-smp kernel-headers-2.4.27-3-sparc32 kernel-headers-2.4.27-3 kernel-headers-2.4.27-3-sparc32-smp kernel-build-2.4.27-3 kernel-image-2.4.27-3-sparc32-smp kernel-image-2.4.27-3-sparc32 kernel-headers-2.4.27-3-sparc64 kernel-headers-2.4.27-3-sparc64-smp
Architecture: source sparc
Version: 2.4.27-9sarge3
Distribution: stable-security
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description:
kernel-build-2.4.27-3 - Headers for building modules for Linux 2.4.27
kernel-headers-2.4.27-3 - Header files related to Linux kernel version 2.4.27
kernel-headers-2.4.27-3-sparc32 - Header files for Linux kernel 2.4.27 on uniprocessor 32-bit SPARC
kernel-headers-2.4.27-3-sparc32-smp - Header files for Linux kernel 2.4.27 on multiprocessor 32-bit SPA
kernel-headers-2.4.27-3-sparc64 - Header files for Linux kernel 2.4.27 on uniprocessor 64-bit SPARC
kernel-headers-2.4.27-3-sparc64-smp - Header files for Linux kernel 2.4.27 on multiprocessor 64-bit SPA
kernel-image-2.4.27-3-sparc32 - Linux kernel binary image for sun4c, sun4m and sun4d
kernel-image-2.4.27-3-sparc32-smp - Linux kernel binary image for SMP sun4m and sun4d
kernel-image-2.4.27-3-sparc64 - Linux kernel binary image for UltraSPARC (sparc64) systems
kernel-image-2.4.27-3-sparc64-smp - Linux kernel binary image for SMP UltraSPARC (sparc64) systems
Changes:
kernel-image-2.4.27-sparc (2.4.27-9sarge3) stable-security; urgency=high
.
* Build against kernel-tree-2.4.27-10sarge3:
* 207_smbfs-chroot-escape.diff
[SECURITY] Fix directory traversal vulnerability in smbfs that permits
local users to escape chroot restrictions
See CVE-2006-1864
* 208_ia64-die_if_kernel-returns.diff
[SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by
an incorrect 'noreturn' attribute on die_if_kernel()
See CVE-2006-0742
* 209_sctp-discard-unexpected-in-closed.diff
[SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks
received in CLOSED state instead of calling BUG()
See CVE-2006-2271
* 210_ipv4-id-no-increment.diff
[SECURITY] Fix vulnerability that allows remote attackers to conduct an
Idle Scan attack, bypassing intended protections against such attacks
See CVE-2006-1242
* 211_usb-gadget-rndis-bufoverflow.diff
[SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation
that allows for a remote DoS attack (kmalloc'd memory corruption)
See CVE-2006-1368
* 212_ipv4-sin_zero_clear.diff
[SECURITY] Fix local information leak in af_inet code
See CVE-2006-1343
* 213_madvise_remove-restrict.diff
[SECURITY] Fix vulnerability that allows local users to bypass IPC
permissions and replace portions of read-only tmpfs files with zeroes.
See CVE-2006-1524
* 214_mcast-ip-route-null-deref.diff
[SECURITY] Fix local DoS vulnerability that allows local users to panic
a system by requesting a route for a multicast IP
See CVE-2006-1525
* 215_sctp-fragment-recurse.diff
[SECURITY] Fix remote DoS vulnerability that can lead to infinite
recursion when a packet containing two or more DATA fragments is received
See CVE-2006-2274
* 216_sctp-fragmented-receive-fix.diff
[SECURITY] Fix remote DoS vulnerability that allows IP fragmented
COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic
See CVE-2006-2272
* 217_amd64-fp-reg-leak.diff
[SECURITY][amd64] Fix an information leak that allows a process to see
a portion of the floating point state of other processes, possibly
exposing sensitive information.
See CVE-2006-1056
* 218_do_add_counters-race.diff
[SECURITY] Fix race condition in the do_add_counters() function in
netfilter that allows local users with CAP_NET_ADMIN capabilities to
read kernel memory
See CVE-2006-0039
* 219_sctp-hb-ack-overflow.diff
[SECURITY] Fix a remote buffer overflow that can result from a badly
formatted HB-ACK chunk
See CVE-2006-1857
* 220_sctp-param-bound-checks.diff
[SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter
checking code
See CVE-2006-1858
* 221_netfilter-do_replace-overflow.diff
[SECURITY] Fix buffer overflow in netfilter do_replace which can could
be triggered by users with CAP_NET_ADMIN rights.
See CVE-2006-0038
* 222_binfmt-bad-elf-entry-address.diff
[SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf
code on em64t processors
See CVE-2006-0741
Files:
ef1ed7e19152004e160a48d320fed490 1074 devel optional kernel-image-2.4.27-sparc_2.4.27-9sarge3.dsc
932ad64503240eedef626a0856fe5665 21264 devel optional kernel-image-2.4.27-sparc_2.4.27-9sarge3.tar.gz
192d85db979604781d849025a1f44ef2 2024732 devel optional kernel-headers-2.4.27-3_2.4.27-9sarge3_sparc.deb
5f0bc79951ced443e6ef009010b679f2 203806 devel optional kernel-headers-2.4.27-3-sparc64-smp_2.4.27-9sarge3_sparc.deb
5865128021dbbc98f9a6c20e6fc574d9 6546074 base optional kernel-image-2.4.27-3-sparc64-smp_2.4.27-9sarge3_sparc.deb
7df862f501733bef8450ba2bacc97b2a 202328 devel optional kernel-headers-2.4.27-3-sparc64_2.4.27-9sarge3_sparc.deb
b308de13ac8b140e4a4d06ccd500b9e6 6379672 base optional kernel-image-2.4.27-3-sparc64_2.4.27-9sarge3_sparc.deb
db2c3fd02eb51afbc1ccc98152a25784 165654 devel optional kernel-headers-2.4.27-3-sparc32-smp_2.4.27-9sarge3_sparc.deb
543e98f2a917fbc57bf8a02c580491eb 3787334 base optional kernel-image-2.4.27-3-sparc32-smp_2.4.27-9sarge3_sparc.deb
ccb65e6e653600dfdbe81fb9f0839789 163860 devel optional kernel-headers-2.4.27-3-sparc32_2.4.27-9sarge3_sparc.deb
050ad637bd78c94c8819e553a50b51ae 3601802 base optional kernel-image-2.4.27-3-sparc32_2.4.27-9sarge3_sparc.deb
00a3aaa8a2c3cb84274e1155d0663fd1 9496 devel optional kernel-build-2.4.27-3_2.4.27-9sarge3_sparc.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)
iD8DBQFEgfEyhuANDBmkLRkRAiimAJ4ovKSQFT/pGQ+9CSpY/idP0MswvgCeLpGA
v2sw8Bz4Jk6LHVctaXHmgqk=
=IlQa
-----END PGP SIGNATURE-----
Accepted:
kernel-build-2.4.27-3_2.4.27-9sarge3_sparc.deb
to pool/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-3_2.4.27-9sarge3_sparc.deb
kernel-headers-2.4.27-3-sparc32-smp_2.4.27-9sarge3_sparc.deb
to pool/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32-smp_2.4.27-9sarge3_sparc.deb
kernel-headers-2.4.27-3-sparc32_2.4.27-9sarge3_sparc.deb
to pool/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32_2.4.27-9sarge3_sparc.deb
kernel-headers-2.4.27-3-sparc64-smp_2.4.27-9sarge3_sparc.deb
to pool/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64-smp_2.4.27-9sarge3_sparc.deb
kernel-headers-2.4.27-3-sparc64_2.4.27-9sarge3_sparc.deb
to pool/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64_2.4.27-9sarge3_sparc.deb
kernel-headers-2.4.27-3_2.4.27-9sarge3_sparc.deb
to pool/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3_2.4.27-9sarge3_sparc.deb
kernel-image-2.4.27-3-sparc32-smp_2.4.27-9sarge3_sparc.deb
to pool/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32-smp_2.4.27-9sarge3_sparc.deb
kernel-image-2.4.27-3-sparc32_2.4.27-9sarge3_sparc.deb
to pool/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32_2.4.27-9sarge3_sparc.deb
kernel-image-2.4.27-3-sparc64-smp_2.4.27-9sarge3_sparc.deb
to pool/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64-smp_2.4.27-9sarge3_sparc.deb
kernel-image-2.4.27-3-sparc64_2.4.27-9sarge3_sparc.deb
to pool/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64_2.4.27-9sarge3_sparc.deb
kernel-image-2.4.27-sparc_2.4.27-9sarge3.dsc
to pool/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge3.dsc
kernel-image-2.4.27-sparc_2.4.27-9sarge3.tar.gz
to pool/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge3.tar.gz
Reply to: