Author: dannf
Date: Tue Dec 5 17:48:18 2006
New Revision: 7941
Modified:
dists/sarge-security/kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian/changelog
dists/sarge-security/kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian/control
dists/sarge-security/kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian/changelog
dists/sarge-security/kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian/control
dists/sarge-security/kernel-2.4/mips/kernel-patch-2.4.27-mips/debian/changelog
dists/sarge-security/kernel-2.4/mips/kernel-patch-2.4.27-mips/debian/control
dists/sarge-security/kernel-2.4/powerpc/kernel-patch-powerpc-2.4.27-2.4.27/debian/changelog
dists/sarge-security/kernel-2.4/s390/kernel-image-2.4.27-s390/debian/changelog
dists/sarge-security/kernel-2.4/s390/kernel-image-2.4.27-s390/debian/control
dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog
dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/changelog
dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/control
dists/sarge-security/kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian/changelog
dists/sarge-security/kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian/control
dists/sarge-security/kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian/changelog
dists/sarge-security/kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian/control
dists/sarge-security/kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian/changelog
dists/sarge-security/kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian/control
dists/sarge-security/kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian/changelog
dists/sarge-security/kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian/control
dists/sarge-security/kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian/changelog
dists/sarge-security/kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian/control
dists/sarge-security/kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian/changelog
dists/sarge-security/kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian/control
dists/sarge-security/kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian/changelog
dists/sarge-security/kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian/rules
dists/sarge-security/kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian/changelog
dists/sarge-security/kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian/control
dists/sarge-security/kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian/changelog
dists/sarge-security/kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian/control
Log:
preparing kernel-image packages for round 6 of sarge updates
Modified:
dists/sarge-security/kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian/changelog
==============================================================================
---
dists/sarge-security/kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian/changelog
(original)
+++
dists/sarge-security/kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian/changelog
Tue Dec 5 17:48:18 2006
@@ -1,3 +1,34 @@
+kernel-image-2.4.27-ia64 (2.4.27-10sarge5) stable-security; urgency=high
+
+ * Build against kernel-tree-2.4.27-10sarge5:
+ * 233_ia64-sparc-cross-region-mappings.diff
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * 234_atm-clip-freed-skb-deref.diff
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * 235_ppc-alignment-exception-table-check.diff
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * 236_s390-uaccess-memleak.diff
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * 237_smbfs-honor-mount-opts.diff
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled (closes: #310982)
+ See CVE-2006-5871
+ * 238_ppc-hid0-dos.diff
+ [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on
+ PPC970 at boot time
+ See CVE-2006-4093
+
+ -- dann frazier <[EMAIL PROTECTED]> Tue, 5 Dec 2006 02:22:55 -0700
+
kernel-image-2.4.27-ia64 (2.4.27-10sarge4) stable-security; urgency=high
* Build against kernel-tree-2.4.27-10sarge4:
Modified:
dists/sarge-security/kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian/control
==============================================================================
---
dists/sarge-security/kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian/control
(original)
+++
dists/sarge-security/kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian/control
Tue Dec 5 17:48:18 2006
@@ -4,7 +4,7 @@
Maintainer: Debian Kernel Team <[email protected]>
Uploaders: dann frazier <[EMAIL PROTECTED]>
Standards-Version: 3.6.1
-Build-Depends: debhelper (>= 2), modutils, kernel-patch-2.4.27-ia64 (=
2.4.27-4), kernel-tree-2.4.27-10sarge4, kernel-package (>= 8.042), bzip2
+Build-Depends: debhelper (>= 2), modutils, kernel-patch-2.4.27-ia64 (=
2.4.27-4), kernel-tree-2.4.27-10sarge5, kernel-package (>= 8.042), bzip2
Package: kernel-headers-2.4.27-3
Architecture: ia64
Modified:
dists/sarge-security/kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian/changelog
==============================================================================
---
dists/sarge-security/kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian/changelog
(original)
+++
dists/sarge-security/kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian/changelog
Tue Dec 5 17:48:18 2006
@@ -1,3 +1,34 @@
+kernel-image-2.4.27-m68k (2.4.27-3sarge5) stable-security; urgency=high
+
+ * Build against kernel-tree-2.4.27-10sarge5:
+ * 233_ia64-sparc-cross-region-mappings.diff
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * 234_atm-clip-freed-skb-deref.diff
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * 235_ppc-alignment-exception-table-check.diff
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * 236_s390-uaccess-memleak.diff
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * 237_smbfs-honor-mount-opts.diff
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled (closes: #310982)
+ See CVE-2006-5871
+ * 238_ppc-hid0-dos.diff
+ [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on
+ PPC970 at boot time
+ See CVE-2006-4093
+
+ -- dann frazier <[EMAIL PROTECTED]> Tue, 5 Dec 2006 02:23:02 -0700
+
kernel-image-2.4.27-m68k (2.4.27-3sarge4) stable-security; urgency=high
* Build against kernel-tree-2.4.27-10sarge4:
Modified:
dists/sarge-security/kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian/control
==============================================================================
---
dists/sarge-security/kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian/control
(original)
+++
dists/sarge-security/kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian/control
Tue Dec 5 17:48:18 2006
@@ -3,7 +3,7 @@
Priority: optional
Maintainer: Christian T. Steigies <[EMAIL PROTECTED]>
Standards-Version: 3.6.1
-Build-Depends: kernel-tree-2.4.27-10sarge4, kernel-patch-2.4.27-m68k,
kernel-package, debhelper, bzip2, console-tools, gcc-2.95
+Build-Depends: kernel-tree-2.4.27-10sarge5, kernel-patch-2.4.27-m68k,
kernel-package, debhelper, bzip2, console-tools, gcc-2.95
Package: kernel-image-2.4.27-amiga
Section: base
Modified:
dists/sarge-security/kernel-2.4/mips/kernel-patch-2.4.27-mips/debian/changelog
==============================================================================
---
dists/sarge-security/kernel-2.4/mips/kernel-patch-2.4.27-mips/debian/changelog
(original)
+++
dists/sarge-security/kernel-2.4/mips/kernel-patch-2.4.27-mips/debian/changelog
Tue Dec 5 17:48:18 2006
@@ -1,3 +1,34 @@
+kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-2) stable-security;
urgency=high
+
+ * Build against kernel-tree-2.4.27-10sarge5:
+ * 233_ia64-sparc-cross-region-mappings.diff
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * 234_atm-clip-freed-skb-deref.diff
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * 235_ppc-alignment-exception-table-check.diff
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * 236_s390-uaccess-memleak.diff
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * 237_smbfs-honor-mount-opts.diff
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled (closes: #310982)
+ See CVE-2006-5871
+ * 238_ppc-hid0-dos.diff
+ [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on
+ PPC970 at boot time
+ See CVE-2006-4093
+
+ -- dann frazier <[EMAIL PROTECTED]> Tue, 5 Dec 2006 02:23:13 -0700
+
kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-1) stable-security;
urgency=high
* Build against kernel-tree-2.4.27-10sarge4:
Modified:
dists/sarge-security/kernel-2.4/mips/kernel-patch-2.4.27-mips/debian/control
==============================================================================
---
dists/sarge-security/kernel-2.4/mips/kernel-patch-2.4.27-mips/debian/control
(original)
+++
dists/sarge-security/kernel-2.4/mips/kernel-patch-2.4.27-mips/debian/control
Tue Dec 5 17:48:18 2006
@@ -3,7 +3,7 @@
Priority: optional
Maintainer: Debian kernel team <[email protected]>
Uploaders: Guido Guenther <[EMAIL PROTECTED]>, Karsten Merker <[EMAIL
PROTECTED]>, Thiemo Seufer <[EMAIL PROTECTED]>
-Build-Depends: kernel-tree-2.4.27-10sarge4, kernel-package, debhelper
(>=4.1.0), modutils, console-tools, dpatch, bzip2
+Build-Depends: kernel-tree-2.4.27-10sarge5, kernel-package, debhelper
(>=4.1.0), modutils, console-tools, dpatch, bzip2
Standards-Version: 3.6.1
Package: kernel-headers-2.4.27
Modified:
dists/sarge-security/kernel-2.4/powerpc/kernel-patch-powerpc-2.4.27-2.4.27/debian/changelog
==============================================================================
---
dists/sarge-security/kernel-2.4/powerpc/kernel-patch-powerpc-2.4.27-2.4.27/debian/changelog
(original)
+++
dists/sarge-security/kernel-2.4/powerpc/kernel-patch-powerpc-2.4.27-2.4.27/debian/changelog
Tue Dec 5 17:48:18 2006
@@ -1,3 +1,34 @@
+kernel-patch-powerpc-2.4.27 (2.4.27-10sarge5) stable-security; urgency=high
+
+ * Build against kernel-tree-2.4.27-10sarge5:
+ * 233_ia64-sparc-cross-region-mappings.diff
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * 234_atm-clip-freed-skb-deref.diff
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * 235_ppc-alignment-exception-table-check.diff
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * 236_s390-uaccess-memleak.diff
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * 237_smbfs-honor-mount-opts.diff
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled (closes: #310982)
+ See CVE-2006-5871
+ * 238_ppc-hid0-dos.diff
+ [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on
+ PPC970 at boot time
+ See CVE-2006-4093
+
+ -- dann frazier <[EMAIL PROTECTED]> Tue, 5 Dec 2006 02:23:21 -0700
+
kernel-patch-powerpc-2.4.27 (2.4.27-10sarge4) stable-security; urgency=high
* Build against kernel-tree-2.4.27-10sarge4:
Modified:
dists/sarge-security/kernel-2.4/s390/kernel-image-2.4.27-s390/debian/changelog
==============================================================================
---
dists/sarge-security/kernel-2.4/s390/kernel-image-2.4.27-s390/debian/changelog
(original)
+++
dists/sarge-security/kernel-2.4/s390/kernel-image-2.4.27-s390/debian/changelog
Tue Dec 5 17:48:18 2006
@@ -1,3 +1,34 @@
+kernel-image-2.4.27-s390 (2.4.27-2sarge5) stable-security; urgency=high
+
+ * Build against kernel-tree-2.4.27-10sarge5:
+ * 233_ia64-sparc-cross-region-mappings.diff
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * 234_atm-clip-freed-skb-deref.diff
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * 235_ppc-alignment-exception-table-check.diff
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * 236_s390-uaccess-memleak.diff
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * 237_smbfs-honor-mount-opts.diff
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled (closes: #310982)
+ See CVE-2006-5871
+ * 238_ppc-hid0-dos.diff
+ [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on
+ PPC970 at boot time
+ See CVE-2006-4093
+
+ -- dann frazier <[EMAIL PROTECTED]> Tue, 5 Dec 2006 02:23:35 -0700
+
kernel-image-2.4.27-s390 (2.4.27-2sarge4) stable-security; urgency=high
* Build against kernel-tree-2.4.27-10sarge4:
Modified:
dists/sarge-security/kernel-2.4/s390/kernel-image-2.4.27-s390/debian/control
==============================================================================
---
dists/sarge-security/kernel-2.4/s390/kernel-image-2.4.27-s390/debian/control
(original)
+++
dists/sarge-security/kernel-2.4/s390/kernel-image-2.4.27-s390/debian/control
Tue Dec 5 17:48:18 2006
@@ -4,7 +4,7 @@
Maintainer: Debian S/390 Team <[email protected]>
Uploaders: Bastian Blank <[EMAIL PROTECTED]>
Standards-Version: 3.5.6
-Build-Depends: debhelper (>> 4.0.0), modutils (>= 2.4.21),
kernel-tree-2.4.27-10sarge4, kernel-patch-2.4.27-s390 (>= 2.4.27-2sarge1),
kernel-package (>= 8.084)
+Build-Depends: debhelper (>> 4.0.0), modutils (>= 2.4.21),
kernel-tree-2.4.27-10sarge5, kernel-patch-2.4.27-s390 (>= 2.4.27-2sarge1),
kernel-package (>= 8.084)
Package: kernel-headers-2.4.27-3
Architecture: s390
Modified:
dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog
==============================================================================
---
dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog
(original)
+++
dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog
Tue Dec 5 17:48:18 2006
@@ -1,4 +1,4 @@
-kernel-source-2.4.27 (2.4.27-10sarge5) UNRELEASED; urgency=low
+kernel-source-2.4.27 (2.4.27-10sarge5) stable-security; urgency=high
* 233_ia64-sparc-cross-region-mappings.diff
[SECURITY] Prevent cross-region mappings on ia64 and sparc which
Modified:
dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/changelog
==============================================================================
---
dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/changelog
(original)
+++
dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/changelog
Tue Dec 5 17:48:18 2006
@@ -1,3 +1,34 @@
+kernel-image-2.4.27-sparc (2.4.27-9sarge5) stable-security; urgency=high
+
+ * Build against kernel-tree-2.4.27-10sarge5:
+ * 233_ia64-sparc-cross-region-mappings.diff
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * 234_atm-clip-freed-skb-deref.diff
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * 235_ppc-alignment-exception-table-check.diff
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * 236_s390-uaccess-memleak.diff
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * 237_smbfs-honor-mount-opts.diff
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled (closes: #310982)
+ See CVE-2006-5871
+ * 238_ppc-hid0-dos.diff
+ [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on
+ PPC970 at boot time
+ See CVE-2006-4093
+
+ -- dann frazier <[EMAIL PROTECTED]> Tue, 5 Dec 2006 02:23:47 -0700
+
kernel-image-2.4.27-sparc (2.4.27-9sarge4) stable-security; urgency=high
* Build against kernel-tree-2.4.27-10sarge4:
Modified:
dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/control
==============================================================================
---
dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/control
(original)
+++
dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/control
Tue Dec 5 17:48:18 2006
@@ -4,7 +4,7 @@
Maintainer: Debian Kernel Team <[email protected]>
Uploaders: Rob Radez <[EMAIL PROTECTED]>, Joshua Kwan <[EMAIL PROTECTED]>,
Andres Salomon <[EMAIL PROTECTED]>
Standards-Version: 3.6.1.0
-Build-Depends: gcc (>= 4:3.3), kernel-tree-2.4.27-10sarge4, debhelper (>= 4),
kernel-package, sparc-utils, modutils
+Build-Depends: gcc (>= 4:3.3), kernel-tree-2.4.27-10sarge5, debhelper (>= 4),
kernel-package, sparc-utils, modutils
Package: kernel-build-2.4.27-3
Architecture: sparc
Modified:
dists/sarge-security/kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian/changelog
==============================================================================
---
dists/sarge-security/kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian/changelog
(original)
+++
dists/sarge-security/kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian/changelog
Tue Dec 5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-image-2.6.8-alpha (2.6.8-16sarge6) stable-security; urgency=high
+
+ * Build against kernel-tree-2.6.8-16sarge6:
+ * perfmon-fd-refcnt.dpatch
+ [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+ system call which could be used as a local denial of service attack
+ by depleting the system of file descriptors
+ See CVE-2006-3741
+ * ia64-sparc-cross-region-mappings.dpatch
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * __block_prepare_write-recovery.dpatch
+ [SECURITY] Fix an information leak in __block_prepare_write()
+ See CVE-2006-4813
+ * atm-clip-freed-skb-deref.dpatch
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * ip6_flowlabel-lockup.dpatch
+ [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+ sequence handling for /proc/net/ip6_flowlabel
+ See CVE-2006-5619
+ * ppc-alignment-exception-table-check.dpatch
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * s390-uaccess-memleak.dpatch
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * smbfs-honor-mount-opts.dpatch
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled
+ See CVE-2006-5871
+ * bridge-get_fdb_entries-overflow.dpatch
+ Protect against possible overflow in get_fdb_entries
+ See CVE-2006-5751
+
+ -- dann frazier <[EMAIL PROTECTED]> Tue, 5 Dec 2006 02:19:29 -0700
+
kernel-image-2.6.8-alpha (2.6.8-16sarge5) stable-security; urgency=high
* Build against kernel-tree-2.6.8-16sarge5:
Modified:
dists/sarge-security/kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian/control
==============================================================================
---
dists/sarge-security/kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian/control
(original)
+++
dists/sarge-security/kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian/control
Tue Dec 5 17:48:18 2006
@@ -4,7 +4,7 @@
Maintainer: Debian Kernel Team <[email protected]>
Uploaders: Norbert Tretkowski <[EMAIL PROTECTED]>
Standards-Version: 3.6.1
-Build-Depends: debhelper (>= 2), kernel-package (>= 8.054),
kernel-tree-2.6.8-16sarge5, module-init-tools
+Build-Depends: debhelper (>= 2), kernel-package (>= 8.054),
kernel-tree-2.6.8-16sarge6, module-init-tools
Package: kernel-headers-2.6.8-3
Architecture: alpha
Modified:
dists/sarge-security/kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian/changelog
==============================================================================
---
dists/sarge-security/kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian/changelog
(original)
+++
dists/sarge-security/kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian/changelog
Tue Dec 5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-image-2.6.8-amd64 (2.6.8-16sarge6) stable-security; urgency=high
+
+ * Build against kernel-tree-2.6.8-16sarge6:
+ * perfmon-fd-refcnt.dpatch
+ [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+ system call which could be used as a local denial of service attack
+ by depleting the system of file descriptors
+ See CVE-2006-3741
+ * ia64-sparc-cross-region-mappings.dpatch
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * __block_prepare_write-recovery.dpatch
+ [SECURITY] Fix an information leak in __block_prepare_write()
+ See CVE-2006-4813
+ * atm-clip-freed-skb-deref.dpatch
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * ip6_flowlabel-lockup.dpatch
+ [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+ sequence handling for /proc/net/ip6_flowlabel
+ See CVE-2006-5619
+ * ppc-alignment-exception-table-check.dpatch
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * s390-uaccess-memleak.dpatch
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * smbfs-honor-mount-opts.dpatch
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled
+ See CVE-2006-5871
+ * bridge-get_fdb_entries-overflow.dpatch
+ Protect against possible overflow in get_fdb_entries
+ See CVE-2006-5751
+
+ -- dann frazier <[EMAIL PROTECTED]> Tue, 5 Dec 2006 02:19:56 -0700
+
kernel-image-2.6.8-amd64 (2.6.8-16sarge5) stable-security; urgency=high
* Build against kernel-tree-2.6.8-16sarge5:
Modified:
dists/sarge-security/kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian/control
==============================================================================
---
dists/sarge-security/kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian/control
(original)
+++
dists/sarge-security/kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian/control
Tue Dec 5 17:48:18 2006
@@ -4,7 +4,7 @@
Maintainer: Debian Kernel Team <[email protected]>
Uploaders: Frederik Schüler <[EMAIL PROTECTED]>
Standards-Version: 3.6.1
-Build-Depends: debhelper (>= 4), kernel-package (>= 8.131),
kernel-tree-2.6.8-16sarge5, module-init-tools, gcc-3.4 (>= 3.4.1-6), dpkg-dev
(>= 1.10.23)
+Build-Depends: debhelper (>= 4), kernel-package (>= 8.131),
kernel-tree-2.6.8-16sarge6, module-init-tools, gcc-3.4 (>= 3.4.1-6), dpkg-dev
(>= 1.10.23)
Package: kernel-headers-2.6.8-12
Architecture: amd64 i386
Modified:
dists/sarge-security/kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian/changelog
==============================================================================
---
dists/sarge-security/kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian/changelog
(original)
+++
dists/sarge-security/kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian/changelog
Tue Dec 5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-image-2.6.8-hppa (2.6.8-6sarge6) stable-security; urgency=high
+
+ * Build against kernel-tree-2.6.8-16sarge6:
+ * perfmon-fd-refcnt.dpatch
+ [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+ system call which could be used as a local denial of service attack
+ by depleting the system of file descriptors
+ See CVE-2006-3741
+ * ia64-sparc-cross-region-mappings.dpatch
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * __block_prepare_write-recovery.dpatch
+ [SECURITY] Fix an information leak in __block_prepare_write()
+ See CVE-2006-4813
+ * atm-clip-freed-skb-deref.dpatch
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * ip6_flowlabel-lockup.dpatch
+ [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+ sequence handling for /proc/net/ip6_flowlabel
+ See CVE-2006-5619
+ * ppc-alignment-exception-table-check.dpatch
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * s390-uaccess-memleak.dpatch
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * smbfs-honor-mount-opts.dpatch
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled
+ See CVE-2006-5871
+ * bridge-get_fdb_entries-overflow.dpatch
+ Protect against possible overflow in get_fdb_entries
+ See CVE-2006-5751
+
+ -- dann frazier <[EMAIL PROTECTED]> Tue, 5 Dec 2006 02:20:16 -0700
+
kernel-image-2.6.8-hppa (2.6.8-6sarge5) stable-security; urgency=high
* Build against kernel-tree-2.6.8-16sarge5:
Modified:
dists/sarge-security/kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian/control
==============================================================================
---
dists/sarge-security/kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian/control
(original)
+++
dists/sarge-security/kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian/control
Tue Dec 5 17:48:18 2006
@@ -3,7 +3,7 @@
Priority: optional
Maintainer: Kyle McMartin <[EMAIL PROTECTED]>
Uploaders: Bdale Garbee <[EMAIL PROTECTED]>, dann frazier <[EMAIL PROTECTED]>
-Build-Depends: kernel-tree-2.6.8-16sarge5, kernel-patch-2.6.8-hppa (>=
2.6.8-5), kernel-package, debianutils (>= 1.6), debhelper (>= 2), bzip2,
module-init-tools, gcc-3.3-hppa64, binutils-hppa64
+Build-Depends: kernel-tree-2.6.8-16sarge6, kernel-patch-2.6.8-hppa (>=
2.6.8-5), kernel-package, debianutils (>= 1.6), debhelper (>= 2), bzip2,
module-init-tools, gcc-3.3-hppa64, binutils-hppa64
Standards-Version: 3.5.4
Package: kernel-headers-2.6.8-3
Modified:
dists/sarge-security/kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian/changelog
==============================================================================
---
dists/sarge-security/kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian/changelog
(original)
+++
dists/sarge-security/kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian/changelog
Tue Dec 5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-image-2.6.8-i386 (2.6.8-16sarge6) stable-security; urgency=high
+
+ * Build against kernel-tree-2.6.8-16sarge6:
+ * perfmon-fd-refcnt.dpatch
+ [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+ system call which could be used as a local denial of service attack
+ by depleting the system of file descriptors
+ See CVE-2006-3741
+ * ia64-sparc-cross-region-mappings.dpatch
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * __block_prepare_write-recovery.dpatch
+ [SECURITY] Fix an information leak in __block_prepare_write()
+ See CVE-2006-4813
+ * atm-clip-freed-skb-deref.dpatch
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * ip6_flowlabel-lockup.dpatch
+ [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+ sequence handling for /proc/net/ip6_flowlabel
+ See CVE-2006-5619
+ * ppc-alignment-exception-table-check.dpatch
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * s390-uaccess-memleak.dpatch
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * smbfs-honor-mount-opts.dpatch
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled
+ See CVE-2006-5871
+ * bridge-get_fdb_entries-overflow.dpatch
+ Protect against possible overflow in get_fdb_entries
+ See CVE-2006-5751
+
+ -- dann frazier <[EMAIL PROTECTED]> Tue, 5 Dec 2006 02:18:31 -0700
+
kernel-image-2.6.8-i386 (2.6.8-16sarge5) stable-security; urgency=high
* Build against kernel-tree-2.6.8-16sarge5:
Modified:
dists/sarge-security/kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian/control
==============================================================================
---
dists/sarge-security/kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian/control
(original)
+++
dists/sarge-security/kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian/control
Tue Dec 5 17:48:18 2006
@@ -4,7 +4,7 @@
Maintainer: Debian kernel team <[email protected]>
Uploaders: William Lee Irwin III <[EMAIL PROTECTED]>, Andres Salomon <[EMAIL
PROTECTED]>, Simon Horman <[EMAIL PROTECTED]>
Standards-Version: 3.6.1
-Build-Depends: debhelper (>= 2), kernel-package (>= 8.054),
kernel-tree-2.6.8-16sarge5, module-init-tools
+Build-Depends: debhelper (>= 2), kernel-package (>= 8.054),
kernel-tree-2.6.8-16sarge6, module-init-tools
Package: kernel-headers-2.6.8-3
Architecture: i386
Modified:
dists/sarge-security/kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian/changelog
==============================================================================
---
dists/sarge-security/kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian/changelog
(original)
+++
dists/sarge-security/kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian/changelog
Tue Dec 5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-image-2.6.8-ia64 (2.6.8-14sarge6) stable-security; urgency=high
+
+ * Build against kernel-tree-2.6.8-16sarge6:
+ * perfmon-fd-refcnt.dpatch
+ [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+ system call which could be used as a local denial of service attack
+ by depleting the system of file descriptors
+ See CVE-2006-3741
+ * ia64-sparc-cross-region-mappings.dpatch
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * __block_prepare_write-recovery.dpatch
+ [SECURITY] Fix an information leak in __block_prepare_write()
+ See CVE-2006-4813
+ * atm-clip-freed-skb-deref.dpatch
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * ip6_flowlabel-lockup.dpatch
+ [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+ sequence handling for /proc/net/ip6_flowlabel
+ See CVE-2006-5619
+ * ppc-alignment-exception-table-check.dpatch
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * s390-uaccess-memleak.dpatch
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * smbfs-honor-mount-opts.dpatch
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled
+ See CVE-2006-5871
+ * bridge-get_fdb_entries-overflow.dpatch
+ Protect against possible overflow in get_fdb_entries
+ See CVE-2006-5751
+
+ -- dann frazier <[EMAIL PROTECTED]> Tue, 5 Dec 2006 02:20:33 -0700
+
kernel-image-2.6.8-ia64 (2.6.8-14sarge5) stable-security; urgency=high
* Build against kernel-tree-2.6.8-16sarge5:
Modified:
dists/sarge-security/kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian/control
==============================================================================
---
dists/sarge-security/kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian/control
(original)
+++
dists/sarge-security/kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian/control
Tue Dec 5 17:48:18 2006
@@ -4,7 +4,7 @@
Maintainer: Debian Kernel Team <[email protected]>
Uploaders: dann frazier <[EMAIL PROTECTED]>
Standards-Version: 3.6.1
-Build-Depends: debhelper (>= 2), kernel-package (>= 8.054),
kernel-tree-2.6.8-16sarge5, module-init-tools
+Build-Depends: debhelper (>= 2), kernel-package (>= 8.054),
kernel-tree-2.6.8-16sarge6, module-init-tools
Package: kernel-headers-2.6.8-3
Architecture: ia64
Modified:
dists/sarge-security/kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian/changelog
==============================================================================
---
dists/sarge-security/kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian/changelog
(original)
+++
dists/sarge-security/kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian/changelog
Tue Dec 5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-image-2.6.8-m68k (2.6.8-4sarge6) stable-security; urgency=high
+
+ * Build against kernel-tree-2.6.8-16sarge6:
+ * perfmon-fd-refcnt.dpatch
+ [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+ system call which could be used as a local denial of service attack
+ by depleting the system of file descriptors
+ See CVE-2006-3741
+ * ia64-sparc-cross-region-mappings.dpatch
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * __block_prepare_write-recovery.dpatch
+ [SECURITY] Fix an information leak in __block_prepare_write()
+ See CVE-2006-4813
+ * atm-clip-freed-skb-deref.dpatch
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * ip6_flowlabel-lockup.dpatch
+ [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+ sequence handling for /proc/net/ip6_flowlabel
+ See CVE-2006-5619
+ * ppc-alignment-exception-table-check.dpatch
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * s390-uaccess-memleak.dpatch
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * smbfs-honor-mount-opts.dpatch
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled
+ See CVE-2006-5871
+ * bridge-get_fdb_entries-overflow.dpatch
+ Protect against possible overflow in get_fdb_entries
+ See CVE-2006-5751
+
+ -- dann frazier <[EMAIL PROTECTED]> Tue, 5 Dec 2006 02:20:58 -0700
+
kernel-image-2.6.8-m68k (2.6.8-4sarge5) stable-security; urgency=high
* Build against kernel-tree-2.6.8-16sarge5:
Modified:
dists/sarge-security/kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian/control
==============================================================================
---
dists/sarge-security/kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian/control
(original)
+++
dists/sarge-security/kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian/control
Tue Dec 5 17:48:18 2006
@@ -3,7 +3,7 @@
Priority: optional
Maintainer: Christian T. Steigies <[EMAIL PROTECTED]>
Standards-Version: 3.6.1
-Build-Depends: kernel-tree-2.6.8-16sarge5, kernel-patch-2.6.8-m68k,
kernel-package, debhelper, bzip2, console-tools
+Build-Depends: kernel-tree-2.6.8-16sarge6, kernel-patch-2.6.8-m68k,
kernel-package, debhelper, bzip2, console-tools
Package: kernel-image-2.6.8-amiga
Section: base
Modified:
dists/sarge-security/kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian/changelog
==============================================================================
---
dists/sarge-security/kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian/changelog
(original)
+++
dists/sarge-security/kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian/changelog
Tue Dec 5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-patch-powerpc-2.6.8 (2.6.8-12sarge6) stable-security; urgency=high
+
+ * Build against kernel-tree-2.6.8-16sarge6:
+ * perfmon-fd-refcnt.dpatch
+ [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+ system call which could be used as a local denial of service attack
+ by depleting the system of file descriptors
+ See CVE-2006-3741
+ * ia64-sparc-cross-region-mappings.dpatch
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * __block_prepare_write-recovery.dpatch
+ [SECURITY] Fix an information leak in __block_prepare_write()
+ See CVE-2006-4813
+ * atm-clip-freed-skb-deref.dpatch
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * ip6_flowlabel-lockup.dpatch
+ [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+ sequence handling for /proc/net/ip6_flowlabel
+ See CVE-2006-5619
+ * ppc-alignment-exception-table-check.dpatch
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * s390-uaccess-memleak.dpatch
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * smbfs-honor-mount-opts.dpatch
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled
+ See CVE-2006-5871
+ * bridge-get_fdb_entries-overflow.dpatch
+ Protect against possible overflow in get_fdb_entries
+ See CVE-2006-5751
+
+ -- dann frazier <[EMAIL PROTECTED]> Tue, 5 Dec 2006 02:21:34 -0700
+
kernel-patch-powerpc-2.6.8 (2.6.8-12sarge5) stable-security; urgency=high
* Build against kernel-tree-2.6.8-16sarge5:
Modified:
dists/sarge-security/kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian/rules
==============================================================================
---
dists/sarge-security/kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian/rules
(original)
+++
dists/sarge-security/kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian/rules
Tue Dec 5 17:48:18 2006
@@ -11,7 +11,7 @@
OFFICIAL_VERSION = No
# This is the kernel-tree version we build against
-ktver = 16sarge5
+ktver = 16sarge6
# set the build architecture if necessary
DEB_HOST_ARCH ?= $(shell dpkg --print-architecture)
Modified:
dists/sarge-security/kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian/changelog
==============================================================================
---
dists/sarge-security/kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian/changelog
(original)
+++
dists/sarge-security/kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian/changelog
Tue Dec 5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-image-2.6.8-s390 (2.6.8-5sarge6) stable-security; urgency=high
+
+ * Build against kernel-tree-2.6.8-16sarge6:
+ * perfmon-fd-refcnt.dpatch
+ [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+ system call which could be used as a local denial of service attack
+ by depleting the system of file descriptors
+ See CVE-2006-3741
+ * ia64-sparc-cross-region-mappings.dpatch
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * __block_prepare_write-recovery.dpatch
+ [SECURITY] Fix an information leak in __block_prepare_write()
+ See CVE-2006-4813
+ * atm-clip-freed-skb-deref.dpatch
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * ip6_flowlabel-lockup.dpatch
+ [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+ sequence handling for /proc/net/ip6_flowlabel
+ See CVE-2006-5619
+ * ppc-alignment-exception-table-check.dpatch
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * s390-uaccess-memleak.dpatch
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * smbfs-honor-mount-opts.dpatch
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled
+ See CVE-2006-5871
+ * bridge-get_fdb_entries-overflow.dpatch
+ Protect against possible overflow in get_fdb_entries
+ See CVE-2006-5751
+
+ -- dann frazier <[EMAIL PROTECTED]> Tue, 5 Dec 2006 02:21:43 -0700
+
kernel-image-2.6.8-s390 (2.6.8-5sarge5) stable-security; urgency=high
* Build against kernel-tree-2.6.8-16sarge5:
Modified:
dists/sarge-security/kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian/control
==============================================================================
---
dists/sarge-security/kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian/control
(original)
+++
dists/sarge-security/kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian/control
Tue Dec 5 17:48:18 2006
@@ -4,7 +4,7 @@
Maintainer: Debian kernel team <[email protected]>
Uploaders: Bastian Blank <[EMAIL PROTECTED]>, Jochen Röhrig <[EMAIL PROTECTED]>
Standards-Version: 3.5.6
-Build-Depends: debhelper (>> 4.0.0), module-init-tools,
kernel-tree-2.6.8-16sarge5, kernel-package (>= 8.084), dh-kpatches
+Build-Depends: debhelper (>> 4.0.0), module-init-tools,
kernel-tree-2.6.8-16sarge6, kernel-package (>= 8.084), dh-kpatches
Package: kernel-patch-2.6.8-s390
Architecture: all
Modified:
dists/sarge-security/kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian/changelog
==============================================================================
---
dists/sarge-security/kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian/changelog
(original)
+++
dists/sarge-security/kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian/changelog
Tue Dec 5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-image-2.6.8-sparc (2.6.8-15sarge6) stable-security; urgency=high
+
+ * Build against kernel-tree-2.6.8-16sarge6:
+ * perfmon-fd-refcnt.dpatch
+ [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+ system call which could be used as a local denial of service attack
+ by depleting the system of file descriptors
+ See CVE-2006-3741
+ * ia64-sparc-cross-region-mappings.dpatch
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * __block_prepare_write-recovery.dpatch
+ [SECURITY] Fix an information leak in __block_prepare_write()
+ See CVE-2006-4813
+ * atm-clip-freed-skb-deref.dpatch
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * ip6_flowlabel-lockup.dpatch
+ [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+ sequence handling for /proc/net/ip6_flowlabel
+ See CVE-2006-5619
+ * ppc-alignment-exception-table-check.dpatch
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * s390-uaccess-memleak.dpatch
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * smbfs-honor-mount-opts.dpatch
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled
+ See CVE-2006-5871
+ * bridge-get_fdb_entries-overflow.dpatch
+ Protect against possible overflow in get_fdb_entries
+ See CVE-2006-5751
+
+ -- dann frazier <[EMAIL PROTECTED]> Tue, 5 Dec 2006 02:21:54 -0700
+
kernel-image-2.6.8-sparc (2.6.8-15sarge5) stable-security; urgency=high
* Build against kernel-tree-2.6.8-16sarge5:
Modified:
dists/sarge-security/kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian/control
==============================================================================
---
dists/sarge-security/kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian/control
(original)
+++
dists/sarge-security/kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian/control
Tue Dec 5 17:48:18 2006
@@ -4,7 +4,7 @@
Maintainer: Debian Kernel Team <[email protected]>
Uploaders: Joshua Kwan <[EMAIL PROTECTED]>, Ben Collins <[EMAIL PROTECTED]>,
Andres Salomon <[EMAIL PROTECTED]>, dann frazier <[EMAIL PROTECTED]>
Standards-Version: 3.6.1.0
-Build-Depends: gcc (>= 4:3.3), kernel-tree-2.6.8-16sarge5, debhelper (>= 4),
kernel-package, sparc-utils, module-init-tools
+Build-Depends: gcc (>= 4:3.3), kernel-tree-2.6.8-16sarge6, debhelper (>= 4),
kernel-package, sparc-utils, module-init-tools
Package: kernel-build-2.6.8-3
Architecture: sparc
_______________________________________________
Kernel-svn-changes mailing list
[email protected]
http://lists.alioth.debian.org/mailman/listinfo/kernel-svn-changes