Accepted kernel-patch-2.4.27-mips 2.4.27-10.sarge3.040815-1 (mips mipsel source)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Wed, 31 May 2006 17:38:01 -0600
Source: kernel-patch-2.4.27-mips
Binary: kernel-headers-2.4.27 kernel-image-2.4.27-sb1-swarm-bn mips-tools kernel-image-2.4.27-r4k-kn04 kernel-image-2.4.27-r4k-ip22 kernel-image-2.4.27-xxs1500 kernel-image-2.4.27-r5k-lasat kernel-image-2.4.27-r3k-kn02 kernel-image-2.4.27-r5k-cobalt kernel-image-2.4.27-r5k-ip22
Architecture: mips mipsel source
Version: 2.4.27-10.sarge3.040815-1
Distribution: stable-security
Urgency: high
Maintainer: Steve McIntyre <93sam@debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description:
kernel-headers-2.4.27 - Header files related to a specific Linux kernel
kernel-image-2.4.27-r4k-ip22 - Linux kernel binary image
kernel-image-2.4.27-r5k-ip22 - Linux kernel binary image
kernel-image-2.4.27-sb1-swarm-bn - Linux kernel binary image
mips-tools - mips specific kernel tools
Changes:
kernel-patch-2.4.27-mips (2.4.27-10.sarge3.040815-1) stable-security; urgency=high
.
* Build against kernel-tree-2.4.27-10sarge3:
* 207_smbfs-chroot-escape.diff
[SECURITY] Fix directory traversal vulnerability in smbfs that permits
local users to escape chroot restrictions
See CVE-2006-1864
* 208_ia64-die_if_kernel-returns.diff
[SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by
an incorrect 'noreturn' attribute on die_if_kernel()
See CVE-2006-0742
* 209_sctp-discard-unexpected-in-closed.diff
[SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks
received in CLOSED state instead of calling BUG()
See CVE-2006-2271
* 210_ipv4-id-no-increment.diff
[SECURITY] Fix vulnerability that allows remote attackers to conduct an
Idle Scan attack, bypassing intended protections against such attacks
See CVE-2006-1242
* 211_usb-gadget-rndis-bufoverflow.diff
[SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation
that allows for a remote DoS attack (kmalloc'd memory corruption)
See CVE-2006-1368
* 212_ipv4-sin_zero_clear.diff
[SECURITY] Fix local information leak in af_inet code
See CVE-2006-1343
* 213_madvise_remove-restrict.diff
[SECURITY] Fix vulnerability that allows local users to bypass IPC
permissions and replace portions of read-only tmpfs files with zeroes.
See CVE-2006-1524
* 214_mcast-ip-route-null-deref.diff
[SECURITY] Fix local DoS vulnerability that allows local users to panic
a system by requesting a route for a multicast IP
See CVE-2006-1525
* 215_sctp-fragment-recurse.diff
[SECURITY] Fix remote DoS vulnerability that can lead to infinite
recursion when a packet containing two or more DATA fragments is received
See CVE-2006-2274
* 216_sctp-fragmented-receive-fix.diff
[SECURITY] Fix remote DoS vulnerability that allows IP fragmented
COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic
See CVE-2006-2272
* 217_amd64-fp-reg-leak.diff
[SECURITY][amd64] Fix an information leak that allows a process to see
a portion of the floating point state of other processes, possibly
exposing sensitive information.
See CVE-2006-1056
* 218_do_add_counters-race.diff
[SECURITY] Fix race condition in the do_add_counters() function in
netfilter that allows local users with CAP_NET_ADMIN capabilities to
read kernel memory
See CVE-2006-0039
* 219_sctp-hb-ack-overflow.diff
[SECURITY] Fix a remote buffer overflow that can result from a badly
formatted HB-ACK chunk
See CVE-2006-1857
* 220_sctp-param-bound-checks.diff
[SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter
checking code
See CVE-2006-1858
* 221_netfilter-do_replace-overflow.diff
[SECURITY] Fix buffer overflow in netfilter do_replace which can could
be triggered by users with CAP_NET_ADMIN rights.
See CVE-2006-0038
* 222_binfmt-bad-elf-entry-address.diff
[SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf
code on em64t processors
See CVE-2006-0741
Files:
0b6ccfb76fed8400f453953d7421c2a6 3852294 base optional kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge3.040815-1_mips.deb
16b29faa543ea16b0f0b1e4b79bcca92 7177648 base optional kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge3.040815-1_mips.deb
1e70d957d920f262ad64af693ead756d 4686362 devel optional kernel-headers-2.4.27_2.4.27-10.sarge3.040815-1_mipsel.deb
219d79c89034cc245aaedcc09c077253 7040154 base optional kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge3.040815-1_mipsel.deb
2e21dc55f4e6c7d8e31485cab88b52a9 3031408 base optional kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge3.040815-1_mipsel.deb
45fe0699fea23090cc4bc9368c6060e9 2137112 base optional kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge3.040815-1_mipsel.deb
4dcc900ca58f7d7e69f0020bb3237dda 4102944 base optional kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge3.040815-1_mipsel.deb
57d70bee7ad3a52c2e41296a4b660748 3849540 base optional kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge3.040815-1_mips.deb
64746373b5c99a31c486fb360ec9048c 4670600 base optional kernel-image-2.4.27-xxs1500_2.4.27-10.sarge3.040815-1_mipsel.deb
76bfca90e34781e213f64d92e412f7d2 4681678 devel optional kernel-headers-2.4.27_2.4.27-10.sarge3.040815-1_mips.deb
83720b4706c20d32513fdc764e19a3db 2991822 base optional kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge3.040815-1_mipsel.deb
ccf2db5585e30dd27b9eaf8d74285e70 309066 devel optional kernel-patch-2.4.27-mips_2.4.27-10.sarge3.040815-1.tar.gz
e28f324bd15f8825721c36d2ad685f8a 1051 devel optional kernel-patch-2.4.27-mips_2.4.27-10.sarge3.040815-1.dsc
f81dbe5f0089f55ccffdb5160fc14529 19330 devel optional mips-tools_2.4.27-10.sarge3.040815-1_mips.deb
f882ee84e76926b99370922778731da6 19372 devel optional mips-tools_2.4.27-10.sarge3.040815-1_mipsel.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)
iD8DBQFEgfI3huANDBmkLRkRAnG7AJ9wy75hynGRpB+toKjp3vcWqdWi1gCaAuXx
7/wD1kGP0Q8ljDIi5mhSr/Q=
=zBjV
-----END PGP SIGNATURE-----
Accepted:
kernel-headers-2.4.27_2.4.27-10.sarge3.040815-1_mips.deb
to pool/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge3.040815-1_mips.deb
kernel-headers-2.4.27_2.4.27-10.sarge3.040815-1_mipsel.deb
to pool/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge3.040815-1_mipsel.deb
kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge3.040815-1_mipsel.deb
to pool/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge3.040815-1_mipsel.deb
kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge3.040815-1_mips.deb
to pool/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge3.040815-1_mips.deb
kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge3.040815-1_mipsel.deb
to pool/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge3.040815-1_mipsel.deb
kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge3.040815-1_mipsel.deb
to pool/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge3.040815-1_mipsel.deb
kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge3.040815-1_mips.deb
to pool/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge3.040815-1_mips.deb
kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge3.040815-1_mipsel.deb
to pool/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge3.040815-1_mipsel.deb
kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge3.040815-1_mips.deb
to pool/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge3.040815-1_mips.deb
kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge3.040815-1_mipsel.deb
to pool/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge3.040815-1_mipsel.deb
kernel-image-2.4.27-xxs1500_2.4.27-10.sarge3.040815-1_mipsel.deb
to pool/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge3.040815-1_mipsel.deb
kernel-patch-2.4.27-mips_2.4.27-10.sarge3.040815-1.dsc
to pool/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge3.040815-1.dsc
kernel-patch-2.4.27-mips_2.4.27-10.sarge3.040815-1.tar.gz
to pool/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge3.040815-1.tar.gz
mips-tools_2.4.27-10.sarge3.040815-1_mips.deb
to pool/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge3.040815-1_mips.deb
mips-tools_2.4.27-10.sarge3.040815-1_mipsel.deb
to pool/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge3.040815-1_mipsel.deb
Reply to: