[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted kernel-image-2.4.27-i386 2.4.27-10sarge3 (source i386)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 29 May 2006 17:18:58 -0600
Source: kernel-image-2.4.27-i386
Binary: kernel-image-2.4.27-3-686 kernel-image-2.4.27-3-586tsc kernel-image-2.4.27-3-k6 kernel-headers-2.4.27-3-586tsc kernel-headers-2.4.27-3-k7-smp kernel-headers-2.4.27-3-k7 kernel-pcmcia-modules-2.4.27-3-k6 kernel-headers-2.4.27-3 kernel-pcmcia-modules-2.4.27-3-386 kernel-headers-2.4.27-3-386 kernel-image-2.4.27-3-386 kernel-image-2.4.27-3-686-smp kernel-pcmcia-modules-2.4.27-3-k7-smp kernel-pcmcia-modules-2.4.27-3-k7 kernel-build-2.4.27-3 kernel-headers-2.4.27-3-686 kernel-headers-2.4.27-3-k6 kernel-image-2.4.27-3-k7-smp kernel-pcmcia-modules-2.4.27-3-686-smp kernel-image-2.4.27-3-k7 kernel-pcmcia-modules-2.4.27-3-586tsc kernel-pcmcia-modules-2.4.27-3-686 kernel-headers-2.4.27-3-686-smp
Architecture: source i386
Version: 2.4.27-10sarge3
Distribution: stable-security
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description: 
 kernel-build-2.4.27-3 - Headers for building modules for Linux 2.4.27
 kernel-headers-2.4.27-3 - Header files related to Linux kernel version 2.4.27
 kernel-headers-2.4.27-3-386 - Linux 2.4.27 kernel headers for 386
 kernel-headers-2.4.27-3-586tsc - Linux 2.4.27 kernel headers for Pentium-Classic
 kernel-headers-2.4.27-3-686 - Linux 2.4.27 kernel headers for PPro/Celeron/PII/PIII/P4
 kernel-headers-2.4.27-3-686-smp - Linux 2.4.27 kernel headers for PPro/Celeron/PII/PIII/P4 SMP
 kernel-headers-2.4.27-3-k6 - Linux 2.4.27 kernel headers for AMD K6/K6-II/K6-III
 kernel-headers-2.4.27-3-k7 - Linux 2.4.27 kernel headers for AMD K7
 kernel-headers-2.4.27-3-k7-smp - Linux 2.4.27 kernel headers for AMD K7 SMP
 kernel-image-2.4.27-3-386 - Linux kernel image for version 2.4.27 on 386
 kernel-image-2.4.27-3-586tsc - Linux kernel image for version 2.4.27 on Pentium-Classic
 kernel-image-2.4.27-3-686 - Linux kernel image for version 2.4.27 on PPro/Celeron/PII/PIII/P4
 kernel-image-2.4.27-3-686-smp - Linux kernel image for version 2.4.27 on PPro/Celeron/PII/PIII/P4
 kernel-image-2.4.27-3-k6 - Linux kernel image for version 2.4.27 on AMD K6/K6-II/K6-III
 kernel-image-2.4.27-3-k7 - Linux kernel image for version 2.4.27 on AMD K7
 kernel-image-2.4.27-3-k7-smp - Linux kernel image for version 2.4.27 on AMD K7 SMP
 kernel-pcmcia-modules-2.4.27-3-386 - Mainstream PCMCIA modules 2.4.27 on 386
 kernel-pcmcia-modules-2.4.27-3-586tsc - Mainstream PCMCIA modules 2.4.27 on Pentium-Classic
 kernel-pcmcia-modules-2.4.27-3-686 - Mainstream PCMCIA modules 2.4.27 on PPro/Celeron/PII/PIII/P4
 kernel-pcmcia-modules-2.4.27-3-686-smp - Mainstream PCMCIA modules 2.4.27 on PPro/Celeron/PII/PIII/P4 SMP
 kernel-pcmcia-modules-2.4.27-3-k6 - Mainstream PCMCIA modules 2.4.27 on AMD K6/K6-II/K6-III
 kernel-pcmcia-modules-2.4.27-3-k7 - Mainstream PCMCIA modules 2.4.27 on AMD K7
 kernel-pcmcia-modules-2.4.27-3-k7-smp - Mainstream PCMCIA modules 2.4.27 on AMD K7 SMP
Changes: 
 kernel-image-2.4.27-i386 (2.4.27-10sarge3) stable-security; urgency=high
 .
   * Build against kernel-tree-2.4.27-10sarge3:
     * 207_smbfs-chroot-escape.diff
       [SECURITY] Fix directory traversal vulnerability in smbfs that permits
       local users to escape chroot restrictions
       See CVE-2006-1864
     * 208_ia64-die_if_kernel-returns.diff
       [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by
       an incorrect 'noreturn' attribute on die_if_kernel()
       See CVE-2006-0742
     * 209_sctp-discard-unexpected-in-closed.diff
       [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks
       received in CLOSED state instead of calling BUG()
       See CVE-2006-2271
     * 210_ipv4-id-no-increment.diff
       [SECURITY] Fix vulnerability that allows remote attackers to conduct an
       Idle Scan attack, bypassing intended protections against such attacks
       See CVE-2006-1242
     * 211_usb-gadget-rndis-bufoverflow.diff
       [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation
       that allows for a remote DoS attack (kmalloc'd memory corruption)
       See CVE-2006-1368
     * 212_ipv4-sin_zero_clear.diff
       [SECURITY] Fix local information leak in af_inet code
       See CVE-2006-1343
     * 213_madvise_remove-restrict.diff
       [SECURITY] Fix vulnerability that allows local users to bypass IPC
       permissions and replace portions of read-only tmpfs files with zeroes.
       See CVE-2006-1524
     * 214_mcast-ip-route-null-deref.diff
       [SECURITY] Fix local DoS vulnerability that allows local users to panic
       a system by requesting a route for a multicast IP
       See CVE-2006-1525
     * 215_sctp-fragment-recurse.diff
       [SECURITY] Fix remote DoS vulnerability that can lead to infinite
       recursion when a packet containing two or more DATA fragments is received
       See CVE-2006-2274
     * 216_sctp-fragmented-receive-fix.diff
       [SECURITY] Fix remote DoS vulnerability that allows IP fragmented
       COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic
       See CVE-2006-2272
     * 217_amd64-fp-reg-leak.diff
       [SECURITY][amd64] Fix an information leak that allows a process to see
       a portion of the floating point state of other processes, possibly
       exposing sensitive information.
       See CVE-2006-1056
     * 218_do_add_counters-race.diff
       [SECURITY] Fix race condition in the do_add_counters() function in
       netfilter that allows local users with CAP_NET_ADMIN capabilities to
       read kernel memory
       See CVE-2006-0039
     * 219_sctp-hb-ack-overflow.diff
       [SECURITY] Fix a remote buffer overflow that can result from a badly
       formatted HB-ACK chunk
       See CVE-2006-1857
     * 220_sctp-param-bound-checks.diff
       [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter
       checking code
       See CVE-2006-1858
     * 221_netfilter-do_replace-overflow.diff
       [SECURITY] Fix buffer overflow in netfilter do_replace which can could
       be triggered by users with CAP_NET_ADMIN rights.
       See CVE-2006-0038
     * 222_binfmt-bad-elf-entry-address.diff
       [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf
       code on em64t processors
       See CVE-2006-0741
Files: 
 a0f54f9d6f61b4a31bdf49b2efa6a2ca 1581 devel optional kernel-image-2.4.27-i386_2.4.27-10sarge3.dsc
 717a42fcf8a6b67690a756b9f3f00aa1 98672 devel optional kernel-image-2.4.27-i386_2.4.27-10sarge3.tar.gz
 b412dad8e3fa8ffbb88f9e24b720682c 1824238 devel optional kernel-headers-2.4.27-3_2.4.27-10sarge3_i386.deb
 bcbd70a2fc6c58ecf1ff373e398069bd 305120 base optional kernel-pcmcia-modules-2.4.27-3-686-smp_2.4.27-10sarge3_i386.deb
 012fa2195bea70f63022c38ee8ece1b8 300914 devel optional kernel-headers-2.4.27-3-686-smp_2.4.27-10sarge3_i386.deb
 64e091ae35b42450a3f0af1af1b1cc17 12682330 base optional kernel-image-2.4.27-3-686-smp_2.4.27-10sarge3_i386.deb
 b867a4d295e544fff9f5f0aa2a660762 268890 base optional kernel-pcmcia-modules-2.4.27-3-386_2.4.27-10sarge3_i386.deb
 03343347f66f3ebae64348769a8e7085 298354 devel optional kernel-headers-2.4.27-3-386_2.4.27-10sarge3_i386.deb
 7c1d176724d5af7ef5d92cf91a4b3a24 11049672 base optional kernel-image-2.4.27-3-386_2.4.27-10sarge3_i386.deb
 80953396a754c47e76dc9c034fb2caab 287484 base optional kernel-pcmcia-modules-2.4.27-3-k6_2.4.27-10sarge3_i386.deb
 29f6f0af6edcc6fdc7b34fd33b4b45a6 298168 devel optional kernel-headers-2.4.27-3-k6_2.4.27-10sarge3_i386.deb
 a039669989458b154e77063b9f2cd05e 11713818 base optional kernel-image-2.4.27-3-k6_2.4.27-10sarge3_i386.deb
 0cfddb9db531337f9220c787e2916002 293320 base optional kernel-pcmcia-modules-2.4.27-3-k7_2.4.27-10sarge3_i386.deb
 8269e91daebb2aca7b360c15a41fa060 299016 devel optional kernel-headers-2.4.27-3-k7_2.4.27-10sarge3_i386.deb
 c53fd67452bade39a41a4d07b1ddbd26 12087676 base optional kernel-image-2.4.27-3-k7_2.4.27-10sarge3_i386.deb
 6165de4b3a2f79b3983d826f490f6c58 299566 base optional kernel-pcmcia-modules-2.4.27-3-686_2.4.27-10sarge3_i386.deb
 cf2755d7c9628bf753d4f9fc59df37f6 299132 devel optional kernel-headers-2.4.27-3-686_2.4.27-10sarge3_i386.deb
 bb4547bd7a55cf5a863faf0eb787af72 12340196 base optional kernel-image-2.4.27-3-686_2.4.27-10sarge3_i386.deb
 293d14c82e8f2dc12d75d9ffbf07a497 293678 base optional kernel-pcmcia-modules-2.4.27-3-586tsc_2.4.27-10sarge3_i386.deb
 d5474dcad0aa041fa1bebffa5531a4cb 298796 devel optional kernel-headers-2.4.27-3-586tsc_2.4.27-10sarge3_i386.deb
 595b16fd83e6ca0ca9b3b4df82934f72 12024800 base optional kernel-image-2.4.27-3-586tsc_2.4.27-10sarge3_i386.deb
 251b20906cabdabc2689f8fad6238485 298236 base optional kernel-pcmcia-modules-2.4.27-3-k7-smp_2.4.27-10sarge3_i386.deb
 cba2acbaa7a11221bf20476dec02cc2c 300776 devel optional kernel-headers-2.4.27-3-k7-smp_2.4.27-10sarge3_i386.deb
 5699a644c8305231c6ff00ca615bc79a 12420578 base optional kernel-image-2.4.27-3-k7-smp_2.4.27-10sarge3_i386.deb
 a52b72284e9b2ac4ea7249b9889dae97 9460 devel optional kernel-build-2.4.27-3_2.4.27-10sarge3_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEfGkDhuANDBmkLRkRAj4bAJ4w9R7PnQESd1ljFfYYVFolGgYG2QCdG1Uc
mW8j1ex285zk/jQqwu5A3Lk=
=S4Lq
-----END PGP SIGNATURE-----


Accepted:
kernel-build-2.4.27-3_2.4.27-10sarge3_i386.deb
  to pool/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-3_2.4.27-10sarge3_i386.deb
kernel-headers-2.4.27-3-386_2.4.27-10sarge3_i386.deb
  to pool/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-386_2.4.27-10sarge3_i386.deb
kernel-headers-2.4.27-3-586tsc_2.4.27-10sarge3_i386.deb
  to pool/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-586tsc_2.4.27-10sarge3_i386.deb
kernel-headers-2.4.27-3-686-smp_2.4.27-10sarge3_i386.deb
  to pool/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686-smp_2.4.27-10sarge3_i386.deb
kernel-headers-2.4.27-3-686_2.4.27-10sarge3_i386.deb
  to pool/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686_2.4.27-10sarge3_i386.deb
kernel-headers-2.4.27-3-k6_2.4.27-10sarge3_i386.deb
  to pool/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k6_2.4.27-10sarge3_i386.deb
kernel-headers-2.4.27-3-k7-smp_2.4.27-10sarge3_i386.deb
  to pool/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7-smp_2.4.27-10sarge3_i386.deb
kernel-headers-2.4.27-3-k7_2.4.27-10sarge3_i386.deb
  to pool/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7_2.4.27-10sarge3_i386.deb
kernel-headers-2.4.27-3_2.4.27-10sarge3_i386.deb
  to pool/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3_2.4.27-10sarge3_i386.deb
kernel-image-2.4.27-3-386_2.4.27-10sarge3_i386.deb
  to pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-386_2.4.27-10sarge3_i386.deb
kernel-image-2.4.27-3-586tsc_2.4.27-10sarge3_i386.deb
  to pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-586tsc_2.4.27-10sarge3_i386.deb
kernel-image-2.4.27-3-686-smp_2.4.27-10sarge3_i386.deb
  to pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686-smp_2.4.27-10sarge3_i386.deb
kernel-image-2.4.27-3-686_2.4.27-10sarge3_i386.deb
  to pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686_2.4.27-10sarge3_i386.deb
kernel-image-2.4.27-3-k6_2.4.27-10sarge3_i386.deb
  to pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k6_2.4.27-10sarge3_i386.deb
kernel-image-2.4.27-3-k7-smp_2.4.27-10sarge3_i386.deb
  to pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7-smp_2.4.27-10sarge3_i386.deb
kernel-image-2.4.27-3-k7_2.4.27-10sarge3_i386.deb
  to pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7_2.4.27-10sarge3_i386.deb
kernel-image-2.4.27-i386_2.4.27-10sarge3.dsc
  to pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge3.dsc
kernel-image-2.4.27-i386_2.4.27-10sarge3.tar.gz
  to pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge3.tar.gz
kernel-pcmcia-modules-2.4.27-3-386_2.4.27-10sarge3_i386.deb
  to pool/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-386_2.4.27-10sarge3_i386.deb
kernel-pcmcia-modules-2.4.27-3-586tsc_2.4.27-10sarge3_i386.deb
  to pool/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-586tsc_2.4.27-10sarge3_i386.deb
kernel-pcmcia-modules-2.4.27-3-686-smp_2.4.27-10sarge3_i386.deb
  to pool/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686-smp_2.4.27-10sarge3_i386.deb
kernel-pcmcia-modules-2.4.27-3-686_2.4.27-10sarge3_i386.deb
  to pool/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686_2.4.27-10sarge3_i386.deb
kernel-pcmcia-modules-2.4.27-3-k6_2.4.27-10sarge3_i386.deb
  to pool/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k6_2.4.27-10sarge3_i386.deb
kernel-pcmcia-modules-2.4.27-3-k7-smp_2.4.27-10sarge3_i386.deb
  to pool/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7-smp_2.4.27-10sarge3_i386.deb
kernel-pcmcia-modules-2.4.27-3-k7_2.4.27-10sarge3_i386.deb
  to pool/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7_2.4.27-10sarge3_i386.deb



Reply to: