[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted kernel-patch-2.4.27-mips 2.4.27-10.sarge3.040815-1 (mips mipsel source)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 31 May 2006 17:38:01 -0600
Source: kernel-patch-2.4.27-mips
Binary: kernel-headers-2.4.27 kernel-image-2.4.27-sb1-swarm-bn mips-tools kernel-image-2.4.27-r4k-kn04 kernel-image-2.4.27-r4k-ip22 kernel-image-2.4.27-xxs1500 kernel-image-2.4.27-r5k-lasat kernel-image-2.4.27-r3k-kn02 kernel-image-2.4.27-r5k-cobalt kernel-image-2.4.27-r5k-ip22
Architecture: mips mipsel source 
Version: 2.4.27-10.sarge3.040815-1
Distribution: stable-security
Urgency: high
Maintainer: Steve McIntyre <93sam@debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description: 
 kernel-headers-2.4.27 - Header files related to a specific Linux kernel
 kernel-image-2.4.27-r4k-ip22 - Linux kernel binary image
 kernel-image-2.4.27-r5k-ip22 - Linux kernel binary image
 kernel-image-2.4.27-sb1-swarm-bn - Linux kernel binary image
 mips-tools - mips specific kernel tools
Changes: 
 kernel-patch-2.4.27-mips (2.4.27-10.sarge3.040815-1) stable-security; urgency=high
 .
   * Build against kernel-tree-2.4.27-10sarge3:
     * 207_smbfs-chroot-escape.diff
       [SECURITY] Fix directory traversal vulnerability in smbfs that permits
       local users to escape chroot restrictions
       See CVE-2006-1864
     * 208_ia64-die_if_kernel-returns.diff
       [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by
       an incorrect 'noreturn' attribute on die_if_kernel()
       See CVE-2006-0742
     * 209_sctp-discard-unexpected-in-closed.diff
       [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks
       received in CLOSED state instead of calling BUG()
       See CVE-2006-2271
     * 210_ipv4-id-no-increment.diff
       [SECURITY] Fix vulnerability that allows remote attackers to conduct an
       Idle Scan attack, bypassing intended protections against such attacks
       See CVE-2006-1242
     * 211_usb-gadget-rndis-bufoverflow.diff
       [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation
       that allows for a remote DoS attack (kmalloc'd memory corruption)
       See CVE-2006-1368
     * 212_ipv4-sin_zero_clear.diff
       [SECURITY] Fix local information leak in af_inet code
       See CVE-2006-1343
     * 213_madvise_remove-restrict.diff
       [SECURITY] Fix vulnerability that allows local users to bypass IPC
       permissions and replace portions of read-only tmpfs files with zeroes.
       See CVE-2006-1524
     * 214_mcast-ip-route-null-deref.diff
       [SECURITY] Fix local DoS vulnerability that allows local users to panic
       a system by requesting a route for a multicast IP
       See CVE-2006-1525
     * 215_sctp-fragment-recurse.diff
       [SECURITY] Fix remote DoS vulnerability that can lead to infinite
       recursion when a packet containing two or more DATA fragments is received
       See CVE-2006-2274
     * 216_sctp-fragmented-receive-fix.diff
       [SECURITY] Fix remote DoS vulnerability that allows IP fragmented
       COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic
       See CVE-2006-2272
     * 217_amd64-fp-reg-leak.diff
       [SECURITY][amd64] Fix an information leak that allows a process to see
       a portion of the floating point state of other processes, possibly
       exposing sensitive information.
       See CVE-2006-1056
     * 218_do_add_counters-race.diff
       [SECURITY] Fix race condition in the do_add_counters() function in
       netfilter that allows local users with CAP_NET_ADMIN capabilities to
       read kernel memory
       See CVE-2006-0039
     * 219_sctp-hb-ack-overflow.diff
       [SECURITY] Fix a remote buffer overflow that can result from a badly
       formatted HB-ACK chunk
       See CVE-2006-1857
     * 220_sctp-param-bound-checks.diff
       [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter
       checking code
       See CVE-2006-1858
     * 221_netfilter-do_replace-overflow.diff
       [SECURITY] Fix buffer overflow in netfilter do_replace which can could
       be triggered by users with CAP_NET_ADMIN rights.
       See CVE-2006-0038
     * 222_binfmt-bad-elf-entry-address.diff
       [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf
       code on em64t processors
       See CVE-2006-0741
Files: 
 0b6ccfb76fed8400f453953d7421c2a6 3852294 base optional kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge3.040815-1_mips.deb
 16b29faa543ea16b0f0b1e4b79bcca92 7177648 base optional kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge3.040815-1_mips.deb
 1e70d957d920f262ad64af693ead756d 4686362 devel optional kernel-headers-2.4.27_2.4.27-10.sarge3.040815-1_mipsel.deb
 219d79c89034cc245aaedcc09c077253 7040154 base optional kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge3.040815-1_mipsel.deb
 2e21dc55f4e6c7d8e31485cab88b52a9 3031408 base optional kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge3.040815-1_mipsel.deb
 45fe0699fea23090cc4bc9368c6060e9 2137112 base optional kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge3.040815-1_mipsel.deb
 4dcc900ca58f7d7e69f0020bb3237dda 4102944 base optional kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge3.040815-1_mipsel.deb
 57d70bee7ad3a52c2e41296a4b660748 3849540 base optional kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge3.040815-1_mips.deb
 64746373b5c99a31c486fb360ec9048c 4670600 base optional kernel-image-2.4.27-xxs1500_2.4.27-10.sarge3.040815-1_mipsel.deb
 76bfca90e34781e213f64d92e412f7d2 4681678 devel optional kernel-headers-2.4.27_2.4.27-10.sarge3.040815-1_mips.deb
 83720b4706c20d32513fdc764e19a3db 2991822 base optional kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge3.040815-1_mipsel.deb
 ccf2db5585e30dd27b9eaf8d74285e70 309066 devel optional kernel-patch-2.4.27-mips_2.4.27-10.sarge3.040815-1.tar.gz
 e28f324bd15f8825721c36d2ad685f8a 1051 devel optional kernel-patch-2.4.27-mips_2.4.27-10.sarge3.040815-1.dsc
 f81dbe5f0089f55ccffdb5160fc14529 19330 devel optional mips-tools_2.4.27-10.sarge3.040815-1_mips.deb
 f882ee84e76926b99370922778731da6 19372 devel optional mips-tools_2.4.27-10.sarge3.040815-1_mipsel.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEgfI3huANDBmkLRkRAnG7AJ9wy75hynGRpB+toKjp3vcWqdWi1gCaAuXx
7/wD1kGP0Q8ljDIi5mhSr/Q=
=zBjV
-----END PGP SIGNATURE-----


Accepted:
kernel-headers-2.4.27_2.4.27-10.sarge3.040815-1_mips.deb
  to pool/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge3.040815-1_mips.deb
kernel-headers-2.4.27_2.4.27-10.sarge3.040815-1_mipsel.deb
  to pool/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge3.040815-1_mipsel.deb
kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge3.040815-1_mipsel.deb
  to pool/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge3.040815-1_mipsel.deb
kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge3.040815-1_mips.deb
  to pool/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge3.040815-1_mips.deb
kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge3.040815-1_mipsel.deb
  to pool/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge3.040815-1_mipsel.deb
kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge3.040815-1_mipsel.deb
  to pool/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge3.040815-1_mipsel.deb
kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge3.040815-1_mips.deb
  to pool/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge3.040815-1_mips.deb
kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge3.040815-1_mipsel.deb
  to pool/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge3.040815-1_mipsel.deb
kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge3.040815-1_mips.deb
  to pool/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge3.040815-1_mips.deb
kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge3.040815-1_mipsel.deb
  to pool/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge3.040815-1_mipsel.deb
kernel-image-2.4.27-xxs1500_2.4.27-10.sarge3.040815-1_mipsel.deb
  to pool/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge3.040815-1_mipsel.deb
kernel-patch-2.4.27-mips_2.4.27-10.sarge3.040815-1.dsc
  to pool/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge3.040815-1.dsc
kernel-patch-2.4.27-mips_2.4.27-10.sarge3.040815-1.tar.gz
  to pool/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge3.040815-1.tar.gz
mips-tools_2.4.27-10.sarge3.040815-1_mips.deb
  to pool/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge3.040815-1_mips.deb
mips-tools_2.4.27-10.sarge3.040815-1_mipsel.deb
  to pool/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge3.040815-1_mipsel.deb



Reply to: