Accepted kernel-image-2.4.27-s390 2.4.27-2sarge5 (s390 source)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Tue, 5 Dec 2006 02:23:35 -0700
Source: kernel-image-2.4.27-s390
Binary: kernel-image-2.4.27-3-s390 kernel-image-2.4.27-3-s390x kernel-headers-2.4.27-3 kernel-image-2.4.27-3-s390-tape
Architecture: s390 source
Version: 2.4.27-2sarge5
Distribution: stable-security
Urgency: high
Maintainer: Debian S/390 Team <debian-s390@lists.debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description:
kernel-headers-2.4.27-3 - Header files related to Linux kernel version 2.4.27 on IBM S/390
kernel-image-2.4.27-3-s390 - Linux kernel image for kernel version 2.4.21 on IBM S/390
kernel-image-2.4.27-3-s390-tape - Linux kernel image for kernel version 2.4.27 on IBM S/390
kernel-image-2.4.27-3-s390x - Linux kernel image for kernel version 2.4.27 on IBM zSeries.
Closes: 310982
Changes:
kernel-image-2.4.27-s390 (2.4.27-2sarge5) stable-security; urgency=high
.
* Build against kernel-tree-2.4.27-10sarge5:
* 233_ia64-sparc-cross-region-mappings.diff
[SECURITY] Prevent cross-region mappings on ia64 and sparc which
could be used in a local DoS attack (system crash)
See CVE-2006-4538
* 234_atm-clip-freed-skb-deref.diff
[SECURITY] Avoid dereferencing an already freed skb, preventing a
potential remote DoS (system crash) vector
See CVE-2006-4997
* 235_ppc-alignment-exception-table-check.diff
[SECURITY][ppc] Avoid potential DoS which can be triggered by some
futex ops
See CVE-2006-5649
* 236_s390-uaccess-memleak.diff
[SECURITY][s390] Fix memory leak in copy_from_user by clearing the
remaining bytes of the kernel buffer after a fault on the userspace
address in copy_from_user()
See CVE-2006-5174
* 237_smbfs-honor-mount-opts.diff
Honor uid, gid and mode mount options for smbfs even when unix extensions
are enabled (closes: #310982)
See CVE-2006-5871
* 238_ppc-hid0-dos.diff
[SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on
PPC970 at boot time
See CVE-2006-4093
Files:
11029023c05ea13dc51206e74bdb2391 2782140 base optional kernel-image-2.4.27-3-s390_2.4.27-2sarge5_s390.deb
61fe3968d2b8e2a0ae27d86bdadd82dd 832 devel optional kernel-image-2.4.27-s390_2.4.27-2sarge5.dsc
749696ce8a74c220819579cb14ebff3a 2974550 base optional kernel-image-2.4.27-3-s390x_2.4.27-2sarge5_s390.deb
982fd40704097c18838e3954de9d946e 10570 devel optional kernel-image-2.4.27-s390_2.4.27-2sarge5.tar.gz
a642f56da45718fe0a665ad1836f6112 995678 base extra kernel-image-2.4.27-3-s390-tape_2.4.27-2sarge5_s390.deb
fc815cfb54bdfed711c2c09fae740500 4579864 devel optional kernel-headers-2.4.27-3_2.4.27-2sarge5_s390.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iD8DBQFFeEfihuANDBmkLRkRAm3aAJ9aftsiL1mllnGQCoK1QiHIoJMemQCfSsgp
SS6RFfO+mnomreAWmtYBgvI=
=oY40
-----END PGP SIGNATURE-----
Accepted:
kernel-headers-2.4.27-3_2.4.27-2sarge5_s390.deb
to pool/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-3_2.4.27-2sarge5_s390.deb
kernel-image-2.4.27-3-s390-tape_2.4.27-2sarge5_s390.deb
to pool/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390-tape_2.4.27-2sarge5_s390.deb
kernel-image-2.4.27-3-s390_2.4.27-2sarge5_s390.deb
to pool/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390_2.4.27-2sarge5_s390.deb
kernel-image-2.4.27-3-s390x_2.4.27-2sarge5_s390.deb
to pool/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390x_2.4.27-2sarge5_s390.deb
kernel-image-2.4.27-s390_2.4.27-2sarge5.dsc
to pool/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge5.dsc
kernel-image-2.4.27-s390_2.4.27-2sarge5.tar.gz
to pool/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge5.tar.gz
Reply to: