kernel-image-2.4.27-alpha_2.4.27-10sarge4_alpha.changes is NEW
(new) kernel-build-2.4.27-3_2.4.27-10sarge4_alpha.deb optional devel
Headers for building modules for Linux 2.4.27
This package provides kernel header files for building modules for the
precompiled kernel images on alpha.
(new) kernel-headers-2.4.27-3-generic_2.4.27-10sarge4_alpha.deb optional devel
Linux kernel headers 2.4.27 on Alpha
This package provides kernel header files for version 2.4.27 on
the Alpha architecture,
for sites that want the latest kernel headers.
Please read /usr/share/doc/kernel-headers-2.4.27-3-generic/debian.README.gz for
details
(new) kernel-headers-2.4.27-3-smp_2.4.27-10sarge4_alpha.deb optional devel
Linux kernel headers 2.4.27 on Alpha SMP
This package provides kernel header files for version 2.4.27 on
the Alpha architecture with SMP support,
for sites that want the latest kernel headers.
SMP (symmetric multi-processing) is needed if you have multiple processors.
Please read /usr/share/doc/kernel-headers-2.4.27-3-smp/debian.README.gz for
details
(new) kernel-headers-2.4.27-3_2.4.27-10sarge4_alpha.deb optional devel
Header files related to Linux kernel version 2.4.27
This package provides kernel header files for version 2.4.27, for sites
that want the latest kernel headers. Please read
/usr/share/doc/kernel-headers-2.4.27-3/debian.README.gz for details
(new) kernel-image-2.4.27-3-generic_2.4.27-10sarge4_alpha.deb optional base
Linux kernel image for version 2.4.27 on Alpha.
This package contains the Linux kernel image for version 2.4.27 on
the Alpha architecture,
the corresponding System.map file, and the modules built by the packager.
It also contains scripts that try to ensure that the system is not left in
a unbootable state after an update.
.
If you wish to update a bootdisk, or to use a bootloader to make
installing and using the image easier, we suggest you install the latest
fdutils (for formatting a floppy to be used as boot disk), and LILO, for a
powerful bootloader. Of course, both these are optional.
.
Kernel image packages are generally produced using kernel-package,
and it is suggested that you install that package if you wish to
create a custom kernel from the sources.
(new) kernel-image-2.4.27-3-smp_2.4.27-10sarge4_alpha.deb optional base
Linux kernel image for version 2.4.27 on Alpha SMP.
This package contains the Linux kernel image for version 2.4.27 on
the Alpha architecture with SMP support,
the corresponding System.map file, and the modules built by the packager.
SMP (symmetric multi-processing) is needed if you have multiple processors.
It also contains scripts that try to ensure that the system is not left in
a unbootable state after an update.
.
If you wish to update a bootdisk, or to use a bootloader to make
installing and using the image easier, we suggest you install the latest
fdutils (for formatting a floppy to be used as boot disk), and LILO, for a
powerful bootloader. Of course, both these are optional.
.
Kernel image packages are generally produced using kernel-package,
and it is suggested that you install that package if you wish to
create a custom kernel from the sources.
kernel-image-2.4.27-alpha_2.4.27-10sarge4.dsc
to pool/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge4.dsc
kernel-image-2.4.27-alpha_2.4.27-10sarge4.tar.gz
to pool/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge4.tar.gz
Changes: kernel-image-2.4.27-alpha (2.4.27-10sarge4) stable-security; urgency=high
.
* Build against kernel-tree-2.4.27-10sarge4:
* [ERRATA] 213_madvise_remove-restrict.diff
[SECURITY] The 2.4.27-10sarge3 changelog associated this patch with
CVE-2006-1524. However, this patch fixes an mprotect issue that was
split off from the original report into CVE-2006-2071. 2.4.27 is not
vulnerable to CVE-2006-1524 the madvise_remove issue.
See CVE-2006-2071
* 223_nfs-handle-long-symlinks.diff
[SECURITY] Fix buffer overflow in NFS readline handling that allows a
remote server to cause a denial of service (crash) via a long symlink
See CVE-2005-4798
* 224_cdrom-bad-cgc.buflen-assign.diff
[SECURITY] Fix buffer overflow in dvd_read_bca which could potentially
be used by a local user to trigger a buffer overflow via a specially
crafted DVD, USB stick, or similar automatically mounted device.
See CVE-2006-2935
* 225_sg-no-mmap-VM_IO.diff
[SECURITY] Fix DoS vulnerability whereby a local user could attempt
a dio/mmap and cause the sg driver to oops.
See CVE-2006-1528
* 226_snmp-nat-mem-corruption-fix.diff
[SECURITY] Fix memory corruption in snmp_trap_decode
See CVE-2006-2444
* 227_kfree_skb.diff
[SECURITY] Fix race between kfree_skb and __skb_unlink
See CVE-2006-2446
* 228_sparc-mb-extraneous-semicolons.diff
Fix a syntax error caused by extranous semicolons in smp_mb() macros
which resulted in a build failure with 227_kfree_skb.diff
* 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff
[SECURITY] Fix SCTP privelege escalation
See CVE-2006-3745
* 231_udf-deadlock.diff
[SECURITY] Fix possible UDF deadlock and memory corruption
See CVE-2006-4145
* 232_sparc-membar-extraneous-semicolons.diff
Fix an additional syntax error caused by extraneous semicolons
in membar macros on sparc
Override entries for your package:
kernel-image-2.4.27-alpha_2.4.27-10sarge4.dsc - source devel
Announcing to debian-changes@lists.debian.org
Your package contains new components which requires manual editing of
the override file. It is ok otherwise, so please be patient. New
packages are usually added to the override file about once a week.
You may have gotten the distribution wrong. You'll get warnings above
if files already exist in other distributions.
Reply to: