Author: dannf
Date: Tue Dec 5 09:20:29 2006
New Revision: 7934
Modified:
dists/sarge-security/kernel-2.4/i386/kernel-image-2.4.27-i386-2.4.27/debian/changelog
dists/sarge-security/kernel-2.4/i386/kernel-image-2.4.27-i386-2.4.27/debian/control
Log:
* Build against kernel-tree-2.4.27-10sarge5:
* 233_ia64-sparc-cross-region-mappings.diff
[SECURITY] Prevent cross-region mappings on ia64 and sparc which
could be used in a local DoS attack (system crash)
See CVE-2006-4538
* 234_atm-clip-freed-skb-deref.diff
[SECURITY] Avoid dereferencing an already freed skb, preventing a
potential remote DoS (system crash) vector
See CVE-2006-4997
* 235_ppc-alignment-exception-table-check.diff
[SECURITY][ppc] Avoid potential DoS which can be triggered by some
futex ops
See CVE-2006-5649
* 236_s390-uaccess-memleak.diff
[SECURITY][s390] Fix memory leak in copy_from_user by clearing the
remaining bytes of the kernel buffer after a fault on the userspace
address in copy_from_user()
See CVE-2006-5174
* 237_smbfs-honor-mount-opts.diff
Honor uid, gid and mode mount options for smbfs even when unix extensions
are enabled (closes: #310982)
See CVE-2006-5871
* 238_ppc-hid0-dos.diff
[SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on
PPC970 at boot time
See CVE-2006-4093
Modified:
dists/sarge-security/kernel-2.4/i386/kernel-image-2.4.27-i386-2.4.27/debian/changelog
==============================================================================
---
dists/sarge-security/kernel-2.4/i386/kernel-image-2.4.27-i386-2.4.27/debian/changelog
(original)
+++
dists/sarge-security/kernel-2.4/i386/kernel-image-2.4.27-i386-2.4.27/debian/changelog
Tue Dec 5 09:20:29 2006
@@ -1,3 +1,34 @@
+kernel-image-2.4.27-i386 (2.4.27-10sarge5) stable-security; urgency=high
+
+ * Build against kernel-tree-2.4.27-10sarge5:
+ * 233_ia64-sparc-cross-region-mappings.diff
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * 234_atm-clip-freed-skb-deref.diff
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * 235_ppc-alignment-exception-table-check.diff
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * 236_s390-uaccess-memleak.diff
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * 237_smbfs-honor-mount-opts.diff
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled (closes: #310982)
+ See CVE-2006-5871
+ * 238_ppc-hid0-dos.diff
+ [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on
+ PPC970 at boot time
+ See CVE-2006-4093
+
+ -- dann frazier <[EMAIL PROTECTED]> Tue, 5 Dec 2006 01:20:25 -0700
+
kernel-image-2.4.27-i386 (2.4.27-10sarge4) stable-security; urgency=high
* Build against kernel-tree-2.4.27-10sarge4:
Modified:
dists/sarge-security/kernel-2.4/i386/kernel-image-2.4.27-i386-2.4.27/debian/control
==============================================================================
---
dists/sarge-security/kernel-2.4/i386/kernel-image-2.4.27-i386-2.4.27/debian/control
(original)
+++
dists/sarge-security/kernel-2.4/i386/kernel-image-2.4.27-i386-2.4.27/debian/control
Tue Dec 5 09:20:29 2006
@@ -4,7 +4,7 @@
Maintainer: Debian Kernel Team <[email protected]>
Uploaders: William Irwin <[EMAIL PROTECTED]>, Sven Luther <[EMAIL PROTECTED]>,
Jens Schmalzing <[EMAIL PROTECTED]>, Jeff Bailey <[EMAIL PROTECTED]>, Dann
Frazier <[EMAIL PROTECTED]>, Simon Horman <[EMAIL PROTECTED]>, Joshua Kwan
<[EMAIL PROTECTED]>
Standards-Version: 3.6.1
-Build-Depends: debhelper (>= 2), modutils, kernel-tree-2.4.27-10sarge4,
kernel-package (>= 8.105)
+Build-Depends: debhelper (>= 2), modutils, kernel-tree-2.4.27-10sarge5,
kernel-package (>= 8.105)
Package: kernel-headers-2.4.27-3
Architecture: i386
_______________________________________________
Kernel-svn-changes mailing list
[email protected]
http://lists.alioth.debian.org/mailman/listinfo/kernel-svn-changes