Accepted kernel-image-speakup-i386 2.4.27-1.1sarge3 (source i386 all)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Wed, 13 Sep 2006 20:42:50 -0600
Source: kernel-image-speakup-i386
Binary: kernel-image-2.4.27-speakup kernel-doc-2.4.27-speakup kernel-headers-2.4.27-speakup
Architecture: source i386 all
Version: 2.4.27-1.1sarge3
Distribution: stable-security
Urgency: high
Maintainer: Mario Lang <mlang@debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description:
kernel-doc-2.4.27-speakup - Linux kernel specific documentation for version 2.4.27-speakup
kernel-headers-2.4.27-speakup - Header files related to Linux kernel version 2.4.27-speakup
kernel-image-2.4.27-speakup - Linux kernel image for version 2.4.27-speakup
Changes:
kernel-image-speakup-i386 (2.4.27-1.1sarge3) stable-security; urgency=high
.
* Build against kernel-tree-2.4.27-10sarge4:
* [ERRATA] 213_madvise_remove-restrict.diff
[SECURITY] The 2.4.27-10sarge3 changelog associated this patch with
CVE-2006-1524. However, this patch fixes an mprotect issue that was
split off from the original report into CVE-2006-2071. 2.4.27 is not
vulnerable to CVE-2006-1524 the madvise_remove issue.
See CVE-2006-2071
* 223_nfs-handle-long-symlinks.diff
[SECURITY] Fix buffer overflow in NFS readline handling that allows a
remote server to cause a denial of service (crash) via a long symlink
See CVE-2005-4798
* 224_cdrom-bad-cgc.buflen-assign.diff
[SECURITY] Fix buffer overflow in dvd_read_bca which could potentially
be used by a local user to trigger a buffer overflow via a specially
crafted DVD, USB stick, or similar automatically mounted device.
See CVE-2006-2935
* 225_sg-no-mmap-VM_IO.diff
[SECURITY] Fix DoS vulnerability whereby a local user could attempt
a dio/mmap and cause the sg driver to oops.
See CVE-2006-1528
* 226_snmp-nat-mem-corruption-fix.diff
[SECURITY] Fix memory corruption in snmp_trap_decode
See CVE-2006-2444
* 227_kfree_skb.diff
[SECURITY] Fix race between kfree_skb and __skb_unlink
See CVE-2006-2446
* 228_sparc-mb-extraneous-semicolons.diff
Fix a syntax error caused by extranous semicolons in smp_mb() macros
which resulted in a build failure with 227_kfree_skb.diff
* 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff
[SECURITY] Fix SCTP privelege escalation
See CVE-2006-3745
* 231_udf-deadlock.diff
[SECURITY] Fix possible UDF deadlock and memory corruption
See CVE-2006-4145
* 232_sparc-membar-extraneous-semicolons.diff
Fix an additional syntax error caused by extraneous semicolons
in membar macros on sparc
Files:
2b9eb5951e8845d997b09d2c6e5c093b 732 devel optional kernel-image-speakup-i386_2.4.27-1.1sarge3.dsc
138bcb10c41d699d8da5ce0d57a99f9c 18478 devel optional kernel-image-speakup-i386_2.4.27-1.1sarge3.tar.gz
d94901322ed779ac670e135a8440b2e0 2420420 doc optional kernel-doc-2.4.27-speakup_2.4.27-1.1sarge3_all.deb
238e18da8cd8497ed37668733ca0d7f7 4772038 devel optional kernel-headers-2.4.27-speakup_2.4.27-1.1sarge3_i386.deb
9dae592d44791ef0aa752ed27dbaa2bd 11306880 base optional kernel-image-2.4.27-speakup_2.4.27-1.1sarge3_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iD8DBQFFEDz9huANDBmkLRkRAm5+AJ9GeD/mVY19K3Swdoip03n4vNOc4QCgkEU2
angYh2pTB5dcdPG9wl1mmmE=
=qOcH
-----END PGP SIGNATURE-----
Accepted:
kernel-doc-2.4.27-speakup_2.4.27-1.1sarge3_all.deb
to pool/main/k/kernel-image-speakup-i386/kernel-doc-2.4.27-speakup_2.4.27-1.1sarge3_all.deb
kernel-headers-2.4.27-speakup_2.4.27-1.1sarge3_i386.deb
to pool/main/k/kernel-image-speakup-i386/kernel-headers-2.4.27-speakup_2.4.27-1.1sarge3_i386.deb
kernel-image-2.4.27-speakup_2.4.27-1.1sarge3_i386.deb
to pool/main/k/kernel-image-speakup-i386/kernel-image-2.4.27-speakup_2.4.27-1.1sarge3_i386.deb
kernel-image-speakup-i386_2.4.27-1.1sarge3.dsc
to pool/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge3.dsc
kernel-image-speakup-i386_2.4.27-1.1sarge3.tar.gz
to pool/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge3.tar.gz
Reply to: