[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

kernel-image-2.4.27-alpha_2.4.27-10sarge4_alpha.changes is NEW



(new) kernel-build-2.4.27-3_2.4.27-10sarge4_alpha.deb optional devel
Headers for building modules for Linux 2.4.27
 This package provides kernel header files for building modules for the
 precompiled kernel images on alpha.
(new) kernel-headers-2.4.27-3-generic_2.4.27-10sarge4_alpha.deb optional devel
Linux kernel headers 2.4.27 on Alpha
 This package provides kernel header files for version 2.4.27 on
 the Alpha architecture,
 for sites that want the latest kernel headers.
 Please read /usr/share/doc/kernel-headers-2.4.27-3-generic/debian.README.gz for
 details
(new) kernel-headers-2.4.27-3-smp_2.4.27-10sarge4_alpha.deb optional devel
Linux kernel headers 2.4.27 on Alpha SMP
 This package provides kernel header files for version 2.4.27 on
 the Alpha architecture with SMP support,
 for sites that want the latest kernel headers.
 SMP (symmetric multi-processing) is needed if you have multiple processors.
 Please read /usr/share/doc/kernel-headers-2.4.27-3-smp/debian.README.gz for
 details
(new) kernel-headers-2.4.27-3_2.4.27-10sarge4_alpha.deb optional devel
Header files related to Linux kernel version 2.4.27
 This package provides kernel header files for version 2.4.27, for sites
 that want the latest kernel headers. Please read
 /usr/share/doc/kernel-headers-2.4.27-3/debian.README.gz for details
(new) kernel-image-2.4.27-3-generic_2.4.27-10sarge4_alpha.deb optional base
Linux kernel image for version 2.4.27 on Alpha.
 This package contains the Linux kernel image for version 2.4.27 on
 the Alpha architecture,
 the corresponding System.map file, and the modules built by the packager.
 It also contains scripts that try to ensure that the system is not left in
 a unbootable state after an update.
 .
 If you wish to update a bootdisk, or to use a bootloader to make
 installing and using the image easier, we suggest you install the latest
 fdutils (for formatting a floppy to be used as boot disk), and LILO, for a
 powerful bootloader. Of course, both these are optional.
 .
 Kernel image packages are generally produced using kernel-package,
 and it is suggested that you install that package if you wish to
 create a custom kernel from the sources.
(new) kernel-image-2.4.27-3-smp_2.4.27-10sarge4_alpha.deb optional base
Linux kernel image for version 2.4.27 on Alpha SMP.
 This package contains the Linux kernel image for version 2.4.27 on
 the Alpha architecture with SMP support,
 the corresponding System.map file, and the modules built by the packager.
 SMP (symmetric multi-processing) is needed if you have multiple processors.
 It also contains scripts that try to ensure that the system is not left in
 a unbootable state after an update.
 .
 If you wish to update a bootdisk, or to use a bootloader to make
 installing and using the image easier, we suggest you install the latest
 fdutils (for formatting a floppy to be used as boot disk), and LILO, for a
 powerful bootloader. Of course, both these are optional.
 .
 Kernel image packages are generally produced using kernel-package,
 and it is suggested that you install that package if you wish to
 create a custom kernel from the sources.
kernel-image-2.4.27-alpha_2.4.27-10sarge4.dsc
  to pool/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge4.dsc
kernel-image-2.4.27-alpha_2.4.27-10sarge4.tar.gz
  to pool/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge4.tar.gz
Changes: kernel-image-2.4.27-alpha (2.4.27-10sarge4) stable-security; urgency=high
 .
  * Build against kernel-tree-2.4.27-10sarge4:
    * [ERRATA] 213_madvise_remove-restrict.diff
      [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with
      CVE-2006-1524. However, this patch fixes an mprotect issue that was
      split off from the original report into CVE-2006-2071. 2.4.27 is not
      vulnerable to CVE-2006-1524 the madvise_remove issue.
      See CVE-2006-2071
    * 223_nfs-handle-long-symlinks.diff
      [SECURITY] Fix buffer overflow in NFS readline handling that allows a
      remote server to cause a denial of service (crash) via a long symlink
      See CVE-2005-4798
    * 224_cdrom-bad-cgc.buflen-assign.diff
      [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially
      be used by a local user to trigger a buffer overflow via a specially
      crafted DVD, USB stick, or similar automatically mounted device.
      See CVE-2006-2935
    * 225_sg-no-mmap-VM_IO.diff
      [SECURITY] Fix DoS vulnerability whereby a local user could attempt
      a dio/mmap and cause the sg driver to oops.
      See CVE-2006-1528
    * 226_snmp-nat-mem-corruption-fix.diff
      [SECURITY] Fix memory corruption in snmp_trap_decode
      See CVE-2006-2444
    * 227_kfree_skb.diff
      [SECURITY] Fix race between kfree_skb and __skb_unlink
      See CVE-2006-2446
    * 228_sparc-mb-extraneous-semicolons.diff
      Fix a syntax error caused by extranous semicolons in smp_mb() macros
      which resulted in a build failure with 227_kfree_skb.diff
    * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff
      [SECURITY] Fix SCTP privelege escalation
      See CVE-2006-3745
    * 231_udf-deadlock.diff
      [SECURITY] Fix possible UDF deadlock and memory corruption
      See CVE-2006-4145
    * 232_sparc-membar-extraneous-semicolons.diff
      Fix an additional syntax error caused by extraneous semicolons
      in membar macros on sparc


Override entries for your package:
kernel-image-2.4.27-alpha_2.4.27-10sarge4.dsc - source devel

Announcing to debian-changes@lists.debian.org


Your package contains new components which requires manual editing of
the override file.  It is ok otherwise, so please be patient.  New
packages are usually added to the override file about once a week.

You may have gotten the distribution wrong.  You'll get warnings above
if files already exist in other distributions.



Reply to: