-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Wed, 31 May 2006 10:05:58 -0600 Source: kernel-image-2.4.27-m68k Binary: kernel-image-2.4.27-sun3 kernel-image-2.4.27-atari kernel-image-2.4.27-q40 kernel-image-2.4.27-sun3x kernel-image-2.4.27-amiga kernel-image-2.4.27-mvme16x kernel-image-2.4.27-mac kernel-image-2.4.27-mvme147 kernel-image-2.4.27-bvme6000 Architecture: source m68k Version: 2.4.27-3sarge3 Distribution: stable-security Urgency: high Maintainer: Christian T. Steigies <cts@debian.org> Changed-By: dann frazier <dannf@debian.org> Description: kernel-image-2.4.27-amiga - Linux kernel image for Amiga computers kernel-image-2.4.27-atari - Linux kernel image for Atari computers kernel-image-2.4.27-bvme6000 - Linux kernel image for BVM BVME4000 and BVME6000 SBCs. kernel-image-2.4.27-mac - Linux kernel image for Macintosh computers kernel-image-2.4.27-mvme147 - Linux kernel image for Motorola MVME147 SBCs. kernel-image-2.4.27-mvme16x - Linux kernel image for Motorola MVME162/6/7, MVME172/7 SBCs. kernel-image-2.4.27-q40 - Linux kernel image for Q40 and Q60 computers Changes: kernel-image-2.4.27-m68k (2.4.27-3sarge3) stable-security; urgency=high . * Build against kernel-tree-2.4.27-10sarge3: * 207_smbfs-chroot-escape.diff [SECURITY] Fix directory traversal vulnerability in smbfs that permits local users to escape chroot restrictions See CVE-2006-1864 * 208_ia64-die_if_kernel-returns.diff [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by an incorrect 'noreturn' attribute on die_if_kernel() See CVE-2006-0742 * 209_sctp-discard-unexpected-in-closed.diff [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks received in CLOSED state instead of calling BUG() See CVE-2006-2271 * 210_ipv4-id-no-increment.diff [SECURITY] Fix vulnerability that allows remote attackers to conduct an Idle Scan attack, bypassing intended protections against such attacks See CVE-2006-1242 * 211_usb-gadget-rndis-bufoverflow.diff [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that allows for a remote DoS attack (kmalloc'd memory corruption) See CVE-2006-1368 * 212_ipv4-sin_zero_clear.diff [SECURITY] Fix local information leak in af_inet code See CVE-2006-1343 * 213_madvise_remove-restrict.diff [SECURITY] Fix vulnerability that allows local users to bypass IPC permissions and replace portions of read-only tmpfs files with zeroes. See CVE-2006-1524 * 214_mcast-ip-route-null-deref.diff [SECURITY] Fix local DoS vulnerability that allows local users to panic a system by requesting a route for a multicast IP See CVE-2006-1525 * 215_sctp-fragment-recurse.diff [SECURITY] Fix remote DoS vulnerability that can lead to infinite recursion when a packet containing two or more DATA fragments is received See CVE-2006-2274 * 216_sctp-fragmented-receive-fix.diff [SECURITY] Fix remote DoS vulnerability that allows IP fragmented COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic See CVE-2006-2272 * 217_amd64-fp-reg-leak.diff [SECURITY][amd64] Fix an information leak that allows a process to see a portion of the floating point state of other processes, possibly exposing sensitive information. See CVE-2006-1056 * 218_do_add_counters-race.diff [SECURITY] Fix race condition in the do_add_counters() function in netfilter that allows local users with CAP_NET_ADMIN capabilities to read kernel memory See CVE-2006-0039 * 219_sctp-hb-ack-overflow.diff [SECURITY] Fix a remote buffer overflow that can result from a badly formatted HB-ACK chunk See CVE-2006-1857 * 220_sctp-param-bound-checks.diff [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter checking code See CVE-2006-1858 * 221_netfilter-do_replace-overflow.diff [SECURITY] Fix buffer overflow in netfilter do_replace which can could be triggered by users with CAP_NET_ADMIN rights. See CVE-2006-0038 * 222_binfmt-bad-elf-entry-address.diff [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf code on em64t processors See CVE-2006-0741 Files: 2340c14db87e56a98e01dd17b095b7d4 876 devel optional kernel-image-2.4.27-m68k_2.4.27-3sarge3.dsc 2813b0290efcd984fef6a69d9ca3c8e7 11080 devel optional kernel-image-2.4.27-m68k_2.4.27-3sarge3.tar.gz 76fcbcdc52016ae4feeafa765a3fc761 2638370 base optional kernel-image-2.4.27-amiga_2.4.27-3sarge3_m68k.deb 00b54f06d0e048692fec00cc8f888cf3 2543516 base optional kernel-image-2.4.27-atari_2.4.27-3sarge3_m68k.deb 9326ce159e507c20e26fc4aa4ec9fa61 2395344 base optional kernel-image-2.4.27-bvme6000_2.4.27-3sarge3_m68k.deb 4baad67d5c9bac3ee608a1f5b1d4dce0 2476584 base optional kernel-image-2.4.27-mac_2.4.27-3sarge3_m68k.deb 202215777ec6ddca992a02551578bd20 2324432 base optional kernel-image-2.4.27-mvme147_2.4.27-3sarge3_m68k.deb 74f11a8ca02e8a1cc776bf950e1d346b 2395830 base optional kernel-image-2.4.27-mvme16x_2.4.27-3sarge3_m68k.deb baacace88b258a02d89ee5158269dc90 2261274 base optional kernel-image-2.4.27-q40_2.4.27-3sarge3_m68k.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.3 (GNU/Linux) iD8DBQFEfiDShuANDBmkLRkRAqePAJ9Y+ahMBlrv/83KNBaCFL6j11SzSQCfbbr5 jDxBprVLRE24T2mJdbqTlsE= =Jmy/ -----END PGP SIGNATURE----- Accepted: kernel-image-2.4.27-amiga_2.4.27-3sarge3_m68k.deb to pool/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge3_m68k.deb kernel-image-2.4.27-atari_2.4.27-3sarge3_m68k.deb to pool/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge3_m68k.deb kernel-image-2.4.27-bvme6000_2.4.27-3sarge3_m68k.deb to pool/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge3_m68k.deb kernel-image-2.4.27-m68k_2.4.27-3sarge3.dsc to pool/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge3.dsc kernel-image-2.4.27-m68k_2.4.27-3sarge3.tar.gz to pool/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge3.tar.gz kernel-image-2.4.27-mac_2.4.27-3sarge3_m68k.deb to pool/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge3_m68k.deb kernel-image-2.4.27-mvme147_2.4.27-3sarge3_m68k.deb to pool/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge3_m68k.deb kernel-image-2.4.27-mvme16x_2.4.27-3sarge3_m68k.deb to pool/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge3_m68k.deb kernel-image-2.4.27-q40_2.4.27-3sarge3_m68k.deb to pool/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge3_m68k.deb