kernel-image-2.4.27-alpha_2.4.27-10sarge6_alpha.changes is NEW
(new) kernel-build-2.4.27-4_2.4.27-10sarge6_alpha.deb optional devel
Headers for building modules for Linux 2.4.27
This package provides kernel header files for building modules for the
precompiled kernel images on alpha.
(new) kernel-headers-2.4.27-4-generic_2.4.27-10sarge6_alpha.deb optional devel
Linux kernel headers 2.4.27 on Alpha
This package provides kernel header files for version 2.4.27 on
the Alpha architecture,
for sites that want the latest kernel headers.
Please read /usr/share/doc/kernel-headers-2.4.27-4-generic/debian.README.gz for
details
(new) kernel-headers-2.4.27-4-smp_2.4.27-10sarge6_alpha.deb optional devel
Linux kernel headers 2.4.27 on Alpha SMP
This package provides kernel header files for version 2.4.27 on
the Alpha architecture with SMP support,
for sites that want the latest kernel headers.
SMP (symmetric multi-processing) is needed if you have multiple processors.
Please read /usr/share/doc/kernel-headers-2.4.27-4-smp/debian.README.gz for
details
(new) kernel-headers-2.4.27-4_2.4.27-10sarge6_alpha.deb optional devel
Header files related to Linux kernel version 2.4.27
This package provides kernel header files for version 2.4.27, for sites
that want the latest kernel headers. Please read
/usr/share/doc/kernel-headers-2.4.27-4/debian.README.gz for details
(new) kernel-image-2.4.27-4-generic_2.4.27-10sarge6_alpha.deb optional base
Linux kernel image for version 2.4.27 on Alpha.
This package contains the Linux kernel image for version 2.4.27 on
the Alpha architecture,
the corresponding System.map file, and the modules built by the packager.
It also contains scripts that try to ensure that the system is not left in
a unbootable state after an update.
.
If you wish to update a bootdisk, or to use a bootloader to make
installing and using the image easier, we suggest you install the latest
fdutils (for formatting a floppy to be used as boot disk), and LILO, for a
powerful bootloader. Of course, both these are optional.
.
Kernel image packages are generally produced using kernel-package,
and it is suggested that you install that package if you wish to
create a custom kernel from the sources.
(new) kernel-image-2.4.27-4-smp_2.4.27-10sarge6_alpha.deb optional base
Linux kernel image for version 2.4.27 on Alpha SMP.
This package contains the Linux kernel image for version 2.4.27 on
the Alpha architecture with SMP support,
the corresponding System.map file, and the modules built by the packager.
SMP (symmetric multi-processing) is needed if you have multiple processors.
It also contains scripts that try to ensure that the system is not left in
a unbootable state after an update.
.
If you wish to update a bootdisk, or to use a bootloader to make
installing and using the image easier, we suggest you install the latest
fdutils (for formatting a floppy to be used as boot disk), and LILO, for a
powerful bootloader. Of course, both these are optional.
.
Kernel image packages are generally produced using kernel-package,
and it is suggested that you install that package if you wish to
create a custom kernel from the sources.
kernel-image-2.4.27-alpha_2.4.27-10sarge6.dsc
to pool/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge6.dsc
kernel-image-2.4.27-alpha_2.4.27-10sarge6.tar.gz
to pool/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge6.tar.gz
Changes: kernel-image-2.4.27-alpha (2.4.27-10sarge6) oldstable-security; urgency=high
.
* Build against kernel-tree-2.4.27-10sarge6:
* 239_mincore-hang.diff
[SECURITY] Fix a potential deadlock in mincore
See CVE-2006-4814
* [ERRATA] 240_smbfs-honor-mount-opts-2.diff
Fix some regressions with respect to file types (e.g., symlinks)
introduced by the fix for CVE-2006-5871 in 2.4.27-10sarge5
* 241_bluetooth-capi-size-checks.diff
[SECURITY] Add additional length checks to avoid potential remote
DoS attacks in the handling of CAPI messages in the bluetooth driver
See CVE-2006-6106
* 242_ext3-fsfuzz.diff
[SECURITY] Fix a DoS vulnerability that can be triggered by a local
user with the ability to mount a corrupted ext3 filesystem
See CVE-2006-6053
* 243_ipv6_fl_socklist-no-share.diff
[SECURITY] Fix local DoS vulnerability caused by inadvertently sharing
ipv6_fl_socklist between the listening socket and the socket created
for connection.
See CVE-2007-1592
* 244_bluetooth-l2cap-hci-info-leaks.diff
245_bluetooth-l2cap-hci-info-leaks-2.diff
[SECURITY] Fix information leaks in setsockopt() implementations
See CVE-2007-1353
* 246_dn_fib-out-of-bounds.diff
266_ipv4-fib_props-out-of-bounds.diff
267_ipv4-fib_props-out-of-bounds-2.diff
[SECURITY] Fix out of bounds condition in dn_fib_props[]
See CVE-2007-2172
* 247_reset-pdeathsig-on-suid.diff
[SECURITY] Fix potential privilege escalation caused by improper
clearing of the child process' pdeath signal.
Thanks to Marcel Holtmann for the patch.
See CVE-2007-3848
* 248_random-reseed-sizeof-fix.diff
[SECURITY] Fix a bug in the random driver reseeding code that reduces
entropy by reseeding a smaller buffer size than expected
See CVE-2007-4311
* 249_openpromfs-signedness-bug.diff
250_openpromfs-checks-1.diff
251_openpromfs-checks-2.diff
252_openpromfs-checks-3.diff
[SECURITY] Fix a number of data checks in openprom code
See CVE-2004-2731
* 253_coredump-only-to-same-uid.diff
[SECURITY] Fix an issue where core dumping over a file that
already exists retains the ownership of the original file
See CVE-2007-6206
* 254_cramfs-check-block-length.diff
[SECURITY] Add a sanity check of the block length in cramfs_readpage to
avoid a potential oops condition
See CVE-2006-5823
* 255_pppoe-socket-release-mem-leak.diff
[SECURITY] fix unpriveleged memory leak when a PPPoE socket is released
after connect but before PPPIOCGCHAN ioctl is called upon it
See CVE-2007-2525
* 256_i4l-isdn_ioctl-mem-overrun.diff
[SECURITY] Fix potential isdn ioctl memory overrun
See CVE-2007-6151
* 257_isdn-net-overflow.diff
[SECURITY] Fix potential overflows in the ISDN subsystem
See CVE-2007-6063
* 258_ext2_readdir-f_pos-fix.diff,
259_ext2_readdir-infinite-loop.diff,
260_ext2-skip-pages-past-num-blocks.diff
[SECURITY] Add some sanity checking for a corrupted i_size in
ext2_find_entry()
See CVE-2006-6054
* 261_listxattr-mem-corruption.diff
[SECURITY] Fix userspace corruption vulnerability caused by
incorrectly promoted return values in bad_inode_ops
This patches changes the kernel ABI.
See CVE-2006-5753
* 262_aacraid-ioctl-perm-check.diff
[SECURITY] Require admin capabilities to issue ioctls to aacraid devices
See CVE-2007-4308
* 263_usb-pwc-disconnect-block.diff
[SECURITY] Fix issue with unplugging webcams that use the pwc driver.
If userspace still has the device open it can result, the driver would
wait for the device to close, blocking the USB subsystem.
See CVE-2007-5093
* 264_mmap-VM_DONTEXPAND.diff
[SECURITY] Add VM_DONTEXPAND to vm_flags in drivers that register
a fault handler but do not bounds check the offset argument
See CVE-2008-0007
* 265_powerpc-chrp-null-deref.diff
[SECURITY][powerpc] Fix NULL pointer dereference if get_property
fails on the subarchitecture
See CVE-2007-6694
* ABI changing update, increment ABI number to 4. If you don't understand
what this means, see http://wiki.debian.org/DebianKernelABIChanges
Override entries for your package:
kernel-image-2.4.27-alpha_2.4.27-10sarge6.dsc - source devel
Announcing to debian-changes@lists.debian.org
Your package contains new components which requires manual editing of
the override file. It is ok otherwise, so please be patient. New
packages are usually added to the override file about once a week.
You may have gotten the distribution wrong. You'll get warnings above
if files already exist in other distributions.
Reply to: