[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted systemimager 3.2.3-6sarge3 (source all)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Thu, 14 Sep 2006 23:53:52 -0600
Source: systemimager
Binary: systemimager-boot-i386-standard systemimager-boot-ia64-standard systemimager-client systemimager-common systemimager-doc systemimager-server systemimager-server-flamethrowerd
Architecture: source all
Version: 3.2.3-6sarge3
Distribution: stable-security
Urgency: high
Maintainer: dann frazier <dannf@debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description: 
 systemimager-boot-i386-standard - SystemImager boot binaries for i386 client nodes
 systemimager-client - Utilities for creating an image and upgrading client machines
 systemimager-common - Utilities and libraries common to both the server and client
 systemimager-doc - Manual and other documentation
 systemimager-server - Automate GNU/Linux installs and upgrades over a network
 systemimager-server-flamethrowerd - SystemImager boot binaries for i386 client nodes
 systemimager-boot-ia64-standard - SystemImager boot binaries for ia64 client nodes

 systemimager-server-flamethrowerd - SystemImager boot binaries for ia64 client nodes
Changes: 
 systemimager (3.2.3-6sarge3) stable-security; urgency=high
 .
   * Build against kernel-tree-2.4.27-10sarge4:
     * [ERRATA] 213_madvise_remove-restrict.diff
       [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with
       CVE-2006-1524. However, this patch fixes an mprotect issue that was
       split off from the original report into CVE-2006-2071. 2.4.27 is not
       vulnerable to CVE-2006-1524 the madvise_remove issue.
       See CVE-2006-2071
     * 223_nfs-handle-long-symlinks.diff
       [SECURITY] Fix buffer overflow in NFS readline handling that allows a
       remote server to cause a denial of service (crash) via a long symlink
       See CVE-2005-4798
     * 224_cdrom-bad-cgc.buflen-assign.diff
       [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially
       be used by a local user to trigger a buffer overflow via a specially
       crafted DVD, USB stick, or similar automatically mounted device.
       See CVE-2006-2935
     * 225_sg-no-mmap-VM_IO.diff
       [SECURITY] Fix DoS vulnerability whereby a local user could attempt
       a dio/mmap and cause the sg driver to oops.
       See CVE-2006-1528
     * 226_snmp-nat-mem-corruption-fix.diff
       [SECURITY] Fix memory corruption in snmp_trap_decode
       See CVE-2006-2444
     * 227_kfree_skb.diff
       [SECURITY] Fix race between kfree_skb and __skb_unlink
       See CVE-2006-2446
     * 228_sparc-mb-extraneous-semicolons.diff
       Fix a syntax error caused by extranous semicolons in smp_mb() macros
       which resulted in a build failure with 227_kfree_skb.diff
     * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff
       [SECURITY] Fix SCTP privelege escalation
       See CVE-2006-3745
     * 231_udf-deadlock.diff
       [SECURITY] Fix possible UDF deadlock and memory corruption
       See CVE-2006-4145
     * 232_sparc-membar-extraneous-semicolons.diff
       Fix an additional syntax error caused by extraneous semicolons
       in membar macros on sparc
Files: 
 d336248751eb3dc712d735db94f17446 1012 admin optional systemimager_3.2.3-6sarge3.dsc
 aa21b1d250b7b2e738a73504e99dcd2b 15979089 admin optional systemimager_3.2.3-6sarge3.tar.gz
 94e132e19815fc68558a470a6c81e877 117730 admin optional systemimager-server_3.2.3-6sarge3_all.deb
 1f6afea14eb6b21550cde51ceeddb00c 31108 admin optional systemimager-client_3.2.3-6sarge3_all.deb
 c387c541a6787dbc7ff417d160cef59b 31332 admin optional systemimager-common_3.2.3-6sarge3_all.deb
 92edcc1b25a875e5c30737a2fe70c531 632064 doc optional systemimager-doc_3.2.3-6sarge3_all.deb
 f24ac7d25eb5121f09bc28b4ed9f3b1a 16616 admin optional systemimager-server-flamethrowerd_3.2.3-6sarge3_all.deb
 5855e76c47690b0dfa70785b6a1f2ca3 4760662 admin optional systemimager-boot-i386-standard_3.2.3-6sarge3_all.deb
 87996510de39b3ac23aa15f36914cf1c 9546576 admin optional systemimager-boot-ia64-standard_3.2.3-6sarge3_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFDtDThuANDBmkLRkRAouaAJsERQdxbwCRW5VuRL5o3LcoioQVmgCfZyko
f7auH1movmNWfIN7FgrkcyI=
=aUxi
-----END PGP SIGNATURE-----


Accepted:
systemimager-boot-i386-standard_3.2.3-6sarge3_all.deb
  to pool/main/s/systemimager/systemimager-boot-i386-standard_3.2.3-6sarge3_all.deb
systemimager-boot-ia64-standard_3.2.3-6sarge3_all.deb
  to pool/main/s/systemimager/systemimager-boot-ia64-standard_3.2.3-6sarge3_all.deb
systemimager-client_3.2.3-6sarge3_all.deb
  to pool/main/s/systemimager/systemimager-client_3.2.3-6sarge3_all.deb
systemimager-common_3.2.3-6sarge3_all.deb
  to pool/main/s/systemimager/systemimager-common_3.2.3-6sarge3_all.deb
systemimager-doc_3.2.3-6sarge3_all.deb
  to pool/main/s/systemimager/systemimager-doc_3.2.3-6sarge3_all.deb
systemimager-server-flamethrowerd_3.2.3-6sarge3_all.deb
  to pool/main/s/systemimager/systemimager-server-flamethrowerd_3.2.3-6sarge3_all.deb
systemimager-server_3.2.3-6sarge3_all.deb
  to pool/main/s/systemimager/systemimager-server_3.2.3-6sarge3_all.deb
systemimager_3.2.3-6sarge3.dsc
  to pool/main/s/systemimager/systemimager_3.2.3-6sarge3.dsc
systemimager_3.2.3-6sarge3.tar.gz
  to pool/main/s/systemimager/systemimager_3.2.3-6sarge3.tar.gz



Reply to: