-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Sun, 3 Sep 2006 18:15:27 -0600 Source: kernel-image-2.4.27-arm Binary: kernel-headers-2.4.27 kernel-build-2.4.27 kernel-image-2.4.27-bast kernel-image-2.4.27-riscstation kernel-image-2.4.27-riscpc kernel-image-2.4.27-netwinder kernel-image-2.4.27-lart Architecture: source arm Version: 2.4.27-2sarge4 Distribution: stable-security Urgency: high Maintainer: Vincent Sanders <vince@debian.org> Changed-By: dann frazier <dannf@debian.org> Description: kernel-build-2.4.27 - Headers for building modules for Linux 2.4.27 kernel-headers-2.4.27 - Header files related to Linux kernel version 2.4.27 kernel-image-2.4.27-bast - Linux kernel image for version 2.4.27 for Bast. kernel-image-2.4.27-lart - Linux kernel image for version 2.4.27 for LART. kernel-image-2.4.27-netwinder - Linux kernel image for version 2.4.27 for Netwinder. kernel-image-2.4.27-riscpc - Linux kernel image for version 2.4.27 for RiscPC. kernel-image-2.4.27-riscstation - Linux kernel image for version 2.4.27 for Riscstations. Changes: kernel-image-2.4.27-arm (2.4.27-2sarge4) stable-security; urgency=high . * Build against kernel-tree-2.4.27-10sarge4: * [ERRATA] 213_madvise_remove-restrict.diff [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.4.27 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * 223_nfs-handle-long-symlinks.diff [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * 224_cdrom-bad-cgc.buflen-assign.diff [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * 225_sg-no-mmap-VM_IO.diff [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * 226_snmp-nat-mem-corruption-fix.diff [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * 227_kfree_skb.diff [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * 228_sparc-mb-extraneous-semicolons.diff Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with 227_kfree_skb.diff * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * 231_udf-deadlock.diff [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * 232_sparc-membar-extraneous-semicolons.diff Fix an additional syntax error caused by extraneous semicolons in membar macros on sparc Files: cd0d106949bcd9a40dcdc4d2a4d862d2 840 devel optional kernel-image-2.4.27-arm_2.4.27-2sarge4.dsc 2dec31a15fe7ea34f1f8c5dc62911568 34000 devel optional kernel-image-2.4.27-arm_2.4.27-2sarge4.tar.gz 7313913662a26b45d228fbe6f1c83a99 1694270 base optional kernel-image-2.4.27-bast_2.4.27-2sarge4_arm.deb 70550ea501a0f66d8b28b4188a6cd3ae 4659450 devel optional kernel-headers-2.4.27_2.4.27-2sarge4_arm.deb 890a70f30487bfad6d30c5b8fee6e796 7338878 base optional kernel-image-2.4.27-netwinder_2.4.27-2sarge4_arm.deb 0ec1622badaf906ebe04c4e9664120ba 466036 devel optional kernel-build-2.4.27_2.4.27-2sarge4_arm.deb 704fc370fc395d231914fd7fa5cfdd43 3673250 base optional kernel-image-2.4.27-riscstation_2.4.27-2sarge4_arm.deb 8147420a25a14158dc1f8d3445a2a430 1058586 base optional kernel-image-2.4.27-lart_2.4.27-2sarge4_arm.deb d6e2d089dedb4eb6a7f769890c3edeca 3150260 base optional kernel-image-2.4.27-riscpc_2.4.27-2sarge4_arm.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFFDtn4huANDBmkLRkRAhZXAJ4j/kzmEIS/a3WMCvXYgiSdM2TmwQCgklhD g+7HPLXIaLmZFqLM4D1vPAI= =1sH1 -----END PGP SIGNATURE----- Accepted: kernel-build-2.4.27_2.4.27-2sarge4_arm.deb to pool/main/k/kernel-image-2.4.27-arm/kernel-build-2.4.27_2.4.27-2sarge4_arm.deb kernel-headers-2.4.27_2.4.27-2sarge4_arm.deb to pool/main/k/kernel-image-2.4.27-arm/kernel-headers-2.4.27_2.4.27-2sarge4_arm.deb kernel-image-2.4.27-arm_2.4.27-2sarge4.dsc to pool/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge4.dsc kernel-image-2.4.27-arm_2.4.27-2sarge4.tar.gz to pool/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge4.tar.gz kernel-image-2.4.27-bast_2.4.27-2sarge4_arm.deb to pool/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-bast_2.4.27-2sarge4_arm.deb kernel-image-2.4.27-lart_2.4.27-2sarge4_arm.deb to pool/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-lart_2.4.27-2sarge4_arm.deb kernel-image-2.4.27-netwinder_2.4.27-2sarge4_arm.deb to pool/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge4_arm.deb kernel-image-2.4.27-riscpc_2.4.27-2sarge4_arm.deb to pool/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge4_arm.deb kernel-image-2.4.27-riscstation_2.4.27-2sarge4_arm.deb to pool/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge4_arm.deb