[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted kernel-image-speakup-i386 2.4.27-1.1sarge4 (source all i386)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue,  5 Dec 2006 09:42:09 -0700
Source: kernel-image-speakup-i386
Binary: kernel-image-2.4.27-speakup kernel-doc-2.4.27-speakup kernel-headers-2.4.27-speakup
Architecture: all i386 source 
Version: 2.4.27-1.1sarge4
Distribution: stable-security
Urgency: high
Maintainer: Mario Lang <mlang@debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description: 
 kernel-doc-2.4.27-speakup - Linux kernel specific documentation for version 2.4.27-speakup
 kernel-headers-2.4.27-speakup - Header files related to Linux kernel version 2.4.27-speakup
 kernel-image-2.4.27-speakup - Linux kernel image for version 2.4.27-speakup
Closes: 310982
Changes: 
 kernel-image-speakup-i386 (2.4.27-1.1sarge4) stable-security; urgency=high
 .
   * Build against kernel-tree-2.4.27-10sarge5:
     * 233_ia64-sparc-cross-region-mappings.diff
       [SECURITY] Prevent cross-region mappings on ia64 and sparc which
       could be used in a local DoS attack (system crash)
       See CVE-2006-4538
     * 234_atm-clip-freed-skb-deref.diff
       [SECURITY] Avoid dereferencing an already freed skb, preventing a
       potential remote DoS (system crash) vector
       See CVE-2006-4997
     * 235_ppc-alignment-exception-table-check.diff
       [SECURITY][ppc] Avoid potential DoS which can be triggered by some
       futex ops
       See CVE-2006-5649
     * 236_s390-uaccess-memleak.diff
       [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
       remaining bytes of the kernel buffer after a fault on the userspace
       address in copy_from_user()
       See CVE-2006-5174
     * 237_smbfs-honor-mount-opts.diff
       Honor uid, gid and mode mount options for smbfs even when unix extensions
       are enabled (closes: #310982)
       See CVE-2006-5871
     * 238_ppc-hid0-dos.diff
       [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on
       PPC970 at boot time
       See CVE-2006-4093
Files: 
 1a05dca524994806146a6900efa71899 2420804 doc optional kernel-doc-2.4.27-speakup_2.4.27-1.1sarge4_all.deb
 ea5120c744a0c6680bd77bc262018e6d 732 devel optional kernel-image-speakup-i386_2.4.27-1.1sarge4.dsc
 8c3955d4fa6d3af721c7d820a2e9d5a1 4773910 devel optional kernel-headers-2.4.27-speakup_2.4.27-1.1sarge4_i386.deb
 ac2eca7ddc6e0fcfa0b7d835b28d3c41 11308946 base optional kernel-image-2.4.27-speakup_2.4.27-1.1sarge4_i386.deb
 f898a597de3f981b99848160f092f06e 18921 devel optional kernel-image-speakup-i386_2.4.27-1.1sarge4.tar.gz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFeFBhhuANDBmkLRkRAqYxAJ9C1YdGNdAXjSWnOm/mD1/mvc9hAwCeIMZn
Py6grRxMfcvNswi7M+ljbMA=
=9RrZ
-----END PGP SIGNATURE-----


Accepted:
kernel-doc-2.4.27-speakup_2.4.27-1.1sarge4_all.deb
  to pool/main/k/kernel-image-speakup-i386/kernel-doc-2.4.27-speakup_2.4.27-1.1sarge4_all.deb
kernel-headers-2.4.27-speakup_2.4.27-1.1sarge4_i386.deb
  to pool/main/k/kernel-image-speakup-i386/kernel-headers-2.4.27-speakup_2.4.27-1.1sarge4_i386.deb
kernel-image-2.4.27-speakup_2.4.27-1.1sarge4_i386.deb
  to pool/main/k/kernel-image-speakup-i386/kernel-image-2.4.27-speakup_2.4.27-1.1sarge4_i386.deb
kernel-image-speakup-i386_2.4.27-1.1sarge4.dsc
  to pool/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge4.dsc
kernel-image-speakup-i386_2.4.27-1.1sarge4.tar.gz
  to pool/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge4.tar.gz



Reply to: