-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Fri, 25 Feb 2005 18:54:47 +0900 Source: kernel-source-2.4.27 Binary: kernel-tree-2.4.27 kernel-source-2.4.27 kernel-patch-debian-2.4.27 kernel-doc-2.4.27 Architecture: source all Version: 2.4.27-8.experimental.1 Distribution: experimental Urgency: low Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org> Changed-By: Simon Horman <[EMAIL PROTECTED]> Description: kernel-doc-2.4.27 - Linux kernel specific documentation for version 2.4.27 kernel-patch-debian-2.4.27 - Debian patches to Linux 2.4.27 kernel-source-2.4.27 - Linux kernel source for version 2.4.27 with Debian patches kernel-tree-2.4.27 - Linux kernel source tree for building Debian kernel images Closes: 291536 Changes: kernel-source-2.4.27 (2.4.27-8.experimental.1) experimental; urgency=low . * There was a stray file in 2.4.27-8. Don't include it this time. (Simon Horman) (closes: Bug#291536) . * Updated kernel-tree description from Martin F Krafft (Simon Horman) . * Updated apply script so it can handle point versions (Simon Horman) . * 134_skb_reset_ip_summed.diff: resolve checksumming exploit in fragmented packet forwarding (Joshua Kwan) . * 135_fix_ip_options_leak.diff: [CAN-2004-1335] fix leak of IP options data. (Joshua Kwan) . * 136_vc_resizing_overflow.diff: [CAN-2004-1333] make sure VC resizing fits in 16 bits. (Joshua Kwan) . * 137_io_edgeport_overflow.diff: [CAN-2004-1017] fix buffer overflow (underflow, really) that opens multiple attack vectors. (Joshua Kwan) . * 138_amd64_syscall_vuln.diff: [CAN-2004--1144] fix the "int 0x80 hole" that allowed overflow of the system call table. (Joshua Kwan) . * 139_sparc_context_switch.diff: fix FPU context switching dirtiness on sparc32 SMP. (Joshua Kwan) . * 140_VM_IO.diff: [CAN-2004-1057] fix possible DoS from accessing freed kernel pages by flagging VM_IO where necessary. . * 141_acpi_noirq.patch: [ACPI] Enhanced PCI probe, CONFIG_HPET_TIMER build warning fix (Simon Horman) . * 142_acpi_skip_timer_override.diff: [ACPI] skip_timer_override backport from 2.6 including early PCI bridge detection. (Simon Horman) . * 121_drm-locking-checks-3.diff: LOCK_TEST_WITH_RETURN build cleanup (Simon Horman) . * [CAN-2005-0204]: AMD64, allows local users to write to privileged IO ports via OUTS instruction (Simon Horman) Files: 5b4cc58f9257c3f5d6139530d9145024 916 devel optional kernel-source-2.4.27_2.4.27-8.experimental.1.dsc df5f8a2586527571fea5a0265ef50e2e 666688 devel optional kernel-source-2.4.27_2.4.27-8.experimental.1.diff.gz 5ed9a19216148192bc1392f775aa94f1 593692 devel optional kernel-patch-debian-2.4.27_2.4.27-8.experimental.1_all.deb 726427ee35682f4786969ee83e38e50d 3574814 doc optional kernel-doc-2.4.27_2.4.27-8.experimental.1_all.deb acc2eda2b0a2c189cdfc745815cf2949 31017052 devel optional kernel-source-2.4.27_2.4.27-8.experimental.1_all.deb 176e5845519df1e4e0d4e94bad499b73 22080 devel optional kernel-tree-2.4.27_2.4.27-8.experimental.1_all.deb
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (GNU/Linux) iD8DBQFCH/zjdu+M6Iexz7URAkZzAJ9sx5alO/Izl2J/s740Vn+fyNOzggCgkfV3 G5Vk+oYTPbBPCNbjg7SjULg= =r2JW -----END PGP SIGNATURE----- Accepted: kernel-doc-2.4.27_2.4.27-8.experimental.1_all.deb to pool/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-8.experimental.1_all.deb kernel-patch-debian-2.4.27_2.4.27-8.experimental.1_all.deb to pool/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-8.experimental.1_all.deb kernel-source-2.4.27_2.4.27-8.experimental.1.diff.gz to pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-8.experimental.1.diff.gz kernel-source-2.4.27_2.4.27-8.experimental.1.dsc to pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-8.experimental.1.dsc kernel-source-2.4.27_2.4.27-8.experimental.1_all.deb to pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-8.experimental.1_all.deb kernel-tree-2.4.27_2.4.27-8.experimental.1_all.deb to pool/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-8.experimental.1_all.deb -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]