[kernel] r7941 - in dists/sarge-security:
kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian
kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian
kernel-2.4/mips/kernel-patch-2.4.27-mips/debian
kernel-2.4/powerpc/kernel-patch-powerpc-2.4.27-2.4.27/debian
kernel-2.4/s390/kernel-image-2.4.27-s390/debian
kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian
kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian
kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian
kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian
kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian
kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian
kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian
kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian
kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian
kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian
kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian
Dann Frazier
dannf at alioth.debian.org
Tue Dec 5 16:48:23 UTC 2006
Author: dannf
Date: Tue Dec 5 17:48:18 2006
New Revision: 7941
Modified:
dists/sarge-security/kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian/changelog
dists/sarge-security/kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian/control
dists/sarge-security/kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian/changelog
dists/sarge-security/kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian/control
dists/sarge-security/kernel-2.4/mips/kernel-patch-2.4.27-mips/debian/changelog
dists/sarge-security/kernel-2.4/mips/kernel-patch-2.4.27-mips/debian/control
dists/sarge-security/kernel-2.4/powerpc/kernel-patch-powerpc-2.4.27-2.4.27/debian/changelog
dists/sarge-security/kernel-2.4/s390/kernel-image-2.4.27-s390/debian/changelog
dists/sarge-security/kernel-2.4/s390/kernel-image-2.4.27-s390/debian/control
dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog
dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/changelog
dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/control
dists/sarge-security/kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian/changelog
dists/sarge-security/kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian/control
dists/sarge-security/kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian/changelog
dists/sarge-security/kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian/control
dists/sarge-security/kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian/changelog
dists/sarge-security/kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian/control
dists/sarge-security/kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian/changelog
dists/sarge-security/kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian/control
dists/sarge-security/kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian/changelog
dists/sarge-security/kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian/control
dists/sarge-security/kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian/changelog
dists/sarge-security/kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian/control
dists/sarge-security/kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian/changelog
dists/sarge-security/kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian/rules
dists/sarge-security/kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian/changelog
dists/sarge-security/kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian/control
dists/sarge-security/kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian/changelog
dists/sarge-security/kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian/control
Log:
preparing kernel-image packages for round 6 of sarge updates
Modified: dists/sarge-security/kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian/changelog
==============================================================================
--- dists/sarge-security/kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian/changelog (original)
+++ dists/sarge-security/kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian/changelog Tue Dec 5 17:48:18 2006
@@ -1,3 +1,34 @@
+kernel-image-2.4.27-ia64 (2.4.27-10sarge5) stable-security; urgency=high
+
+ * Build against kernel-tree-2.4.27-10sarge5:
+ * 233_ia64-sparc-cross-region-mappings.diff
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * 234_atm-clip-freed-skb-deref.diff
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * 235_ppc-alignment-exception-table-check.diff
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * 236_s390-uaccess-memleak.diff
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * 237_smbfs-honor-mount-opts.diff
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled (closes: #310982)
+ See CVE-2006-5871
+ * 238_ppc-hid0-dos.diff
+ [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on
+ PPC970 at boot time
+ See CVE-2006-4093
+
+ -- dann frazier <dannf at debian.org> Tue, 5 Dec 2006 02:22:55 -0700
+
kernel-image-2.4.27-ia64 (2.4.27-10sarge4) stable-security; urgency=high
* Build against kernel-tree-2.4.27-10sarge4:
Modified: dists/sarge-security/kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian/control
==============================================================================
--- dists/sarge-security/kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian/control (original)
+++ dists/sarge-security/kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian/control Tue Dec 5 17:48:18 2006
@@ -4,7 +4,7 @@
Maintainer: Debian Kernel Team <debian-kernel at lists.debian.org>
Uploaders: dann frazier <dannf at debian.org>
Standards-Version: 3.6.1
-Build-Depends: debhelper (>= 2), modutils, kernel-patch-2.4.27-ia64 (= 2.4.27-4), kernel-tree-2.4.27-10sarge4, kernel-package (>= 8.042), bzip2
+Build-Depends: debhelper (>= 2), modutils, kernel-patch-2.4.27-ia64 (= 2.4.27-4), kernel-tree-2.4.27-10sarge5, kernel-package (>= 8.042), bzip2
Package: kernel-headers-2.4.27-3
Architecture: ia64
Modified: dists/sarge-security/kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian/changelog
==============================================================================
--- dists/sarge-security/kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian/changelog (original)
+++ dists/sarge-security/kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian/changelog Tue Dec 5 17:48:18 2006
@@ -1,3 +1,34 @@
+kernel-image-2.4.27-m68k (2.4.27-3sarge5) stable-security; urgency=high
+
+ * Build against kernel-tree-2.4.27-10sarge5:
+ * 233_ia64-sparc-cross-region-mappings.diff
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * 234_atm-clip-freed-skb-deref.diff
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * 235_ppc-alignment-exception-table-check.diff
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * 236_s390-uaccess-memleak.diff
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * 237_smbfs-honor-mount-opts.diff
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled (closes: #310982)
+ See CVE-2006-5871
+ * 238_ppc-hid0-dos.diff
+ [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on
+ PPC970 at boot time
+ See CVE-2006-4093
+
+ -- dann frazier <dannf at debian.org> Tue, 5 Dec 2006 02:23:02 -0700
+
kernel-image-2.4.27-m68k (2.4.27-3sarge4) stable-security; urgency=high
* Build against kernel-tree-2.4.27-10sarge4:
Modified: dists/sarge-security/kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian/control
==============================================================================
--- dists/sarge-security/kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian/control (original)
+++ dists/sarge-security/kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian/control Tue Dec 5 17:48:18 2006
@@ -3,7 +3,7 @@
Priority: optional
Maintainer: Christian T. Steigies <cts at debian.org>
Standards-Version: 3.6.1
-Build-Depends: kernel-tree-2.4.27-10sarge4, kernel-patch-2.4.27-m68k, kernel-package, debhelper, bzip2, console-tools, gcc-2.95
+Build-Depends: kernel-tree-2.4.27-10sarge5, kernel-patch-2.4.27-m68k, kernel-package, debhelper, bzip2, console-tools, gcc-2.95
Package: kernel-image-2.4.27-amiga
Section: base
Modified: dists/sarge-security/kernel-2.4/mips/kernel-patch-2.4.27-mips/debian/changelog
==============================================================================
--- dists/sarge-security/kernel-2.4/mips/kernel-patch-2.4.27-mips/debian/changelog (original)
+++ dists/sarge-security/kernel-2.4/mips/kernel-patch-2.4.27-mips/debian/changelog Tue Dec 5 17:48:18 2006
@@ -1,3 +1,34 @@
+kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-2) stable-security; urgency=high
+
+ * Build against kernel-tree-2.4.27-10sarge5:
+ * 233_ia64-sparc-cross-region-mappings.diff
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * 234_atm-clip-freed-skb-deref.diff
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * 235_ppc-alignment-exception-table-check.diff
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * 236_s390-uaccess-memleak.diff
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * 237_smbfs-honor-mount-opts.diff
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled (closes: #310982)
+ See CVE-2006-5871
+ * 238_ppc-hid0-dos.diff
+ [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on
+ PPC970 at boot time
+ See CVE-2006-4093
+
+ -- dann frazier <dannf at debian.org> Tue, 5 Dec 2006 02:23:13 -0700
+
kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-1) stable-security; urgency=high
* Build against kernel-tree-2.4.27-10sarge4:
Modified: dists/sarge-security/kernel-2.4/mips/kernel-patch-2.4.27-mips/debian/control
==============================================================================
--- dists/sarge-security/kernel-2.4/mips/kernel-patch-2.4.27-mips/debian/control (original)
+++ dists/sarge-security/kernel-2.4/mips/kernel-patch-2.4.27-mips/debian/control Tue Dec 5 17:48:18 2006
@@ -3,7 +3,7 @@
Priority: optional
Maintainer: Debian kernel team <debian-kernel at lists.debian.org>
Uploaders: Guido Guenther <agx at debian.org>, Karsten Merker <merker at debian.org>, Thiemo Seufer <ths at debian.org>
-Build-Depends: kernel-tree-2.4.27-10sarge4, kernel-package, debhelper (>=4.1.0), modutils, console-tools, dpatch, bzip2
+Build-Depends: kernel-tree-2.4.27-10sarge5, kernel-package, debhelper (>=4.1.0), modutils, console-tools, dpatch, bzip2
Standards-Version: 3.6.1
Package: kernel-headers-2.4.27
Modified: dists/sarge-security/kernel-2.4/powerpc/kernel-patch-powerpc-2.4.27-2.4.27/debian/changelog
==============================================================================
--- dists/sarge-security/kernel-2.4/powerpc/kernel-patch-powerpc-2.4.27-2.4.27/debian/changelog (original)
+++ dists/sarge-security/kernel-2.4/powerpc/kernel-patch-powerpc-2.4.27-2.4.27/debian/changelog Tue Dec 5 17:48:18 2006
@@ -1,3 +1,34 @@
+kernel-patch-powerpc-2.4.27 (2.4.27-10sarge5) stable-security; urgency=high
+
+ * Build against kernel-tree-2.4.27-10sarge5:
+ * 233_ia64-sparc-cross-region-mappings.diff
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * 234_atm-clip-freed-skb-deref.diff
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * 235_ppc-alignment-exception-table-check.diff
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * 236_s390-uaccess-memleak.diff
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * 237_smbfs-honor-mount-opts.diff
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled (closes: #310982)
+ See CVE-2006-5871
+ * 238_ppc-hid0-dos.diff
+ [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on
+ PPC970 at boot time
+ See CVE-2006-4093
+
+ -- dann frazier <dannf at debian.org> Tue, 5 Dec 2006 02:23:21 -0700
+
kernel-patch-powerpc-2.4.27 (2.4.27-10sarge4) stable-security; urgency=high
* Build against kernel-tree-2.4.27-10sarge4:
Modified: dists/sarge-security/kernel-2.4/s390/kernel-image-2.4.27-s390/debian/changelog
==============================================================================
--- dists/sarge-security/kernel-2.4/s390/kernel-image-2.4.27-s390/debian/changelog (original)
+++ dists/sarge-security/kernel-2.4/s390/kernel-image-2.4.27-s390/debian/changelog Tue Dec 5 17:48:18 2006
@@ -1,3 +1,34 @@
+kernel-image-2.4.27-s390 (2.4.27-2sarge5) stable-security; urgency=high
+
+ * Build against kernel-tree-2.4.27-10sarge5:
+ * 233_ia64-sparc-cross-region-mappings.diff
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * 234_atm-clip-freed-skb-deref.diff
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * 235_ppc-alignment-exception-table-check.diff
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * 236_s390-uaccess-memleak.diff
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * 237_smbfs-honor-mount-opts.diff
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled (closes: #310982)
+ See CVE-2006-5871
+ * 238_ppc-hid0-dos.diff
+ [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on
+ PPC970 at boot time
+ See CVE-2006-4093
+
+ -- dann frazier <dannf at debian.org> Tue, 5 Dec 2006 02:23:35 -0700
+
kernel-image-2.4.27-s390 (2.4.27-2sarge4) stable-security; urgency=high
* Build against kernel-tree-2.4.27-10sarge4:
Modified: dists/sarge-security/kernel-2.4/s390/kernel-image-2.4.27-s390/debian/control
==============================================================================
--- dists/sarge-security/kernel-2.4/s390/kernel-image-2.4.27-s390/debian/control (original)
+++ dists/sarge-security/kernel-2.4/s390/kernel-image-2.4.27-s390/debian/control Tue Dec 5 17:48:18 2006
@@ -4,7 +4,7 @@
Maintainer: Debian S/390 Team <debian-s390 at lists.debian.org>
Uploaders: Bastian Blank <waldi at debian.org>
Standards-Version: 3.5.6
-Build-Depends: debhelper (>> 4.0.0), modutils (>= 2.4.21), kernel-tree-2.4.27-10sarge4, kernel-patch-2.4.27-s390 (>= 2.4.27-2sarge1), kernel-package (>= 8.084)
+Build-Depends: debhelper (>> 4.0.0), modutils (>= 2.4.21), kernel-tree-2.4.27-10sarge5, kernel-patch-2.4.27-s390 (>= 2.4.27-2sarge1), kernel-package (>= 8.084)
Package: kernel-headers-2.4.27-3
Architecture: s390
Modified: dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog
==============================================================================
--- dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog (original)
+++ dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog Tue Dec 5 17:48:18 2006
@@ -1,4 +1,4 @@
-kernel-source-2.4.27 (2.4.27-10sarge5) UNRELEASED; urgency=low
+kernel-source-2.4.27 (2.4.27-10sarge5) stable-security; urgency=high
* 233_ia64-sparc-cross-region-mappings.diff
[SECURITY] Prevent cross-region mappings on ia64 and sparc which
Modified: dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/changelog
==============================================================================
--- dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/changelog (original)
+++ dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/changelog Tue Dec 5 17:48:18 2006
@@ -1,3 +1,34 @@
+kernel-image-2.4.27-sparc (2.4.27-9sarge5) stable-security; urgency=high
+
+ * Build against kernel-tree-2.4.27-10sarge5:
+ * 233_ia64-sparc-cross-region-mappings.diff
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * 234_atm-clip-freed-skb-deref.diff
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * 235_ppc-alignment-exception-table-check.diff
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * 236_s390-uaccess-memleak.diff
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * 237_smbfs-honor-mount-opts.diff
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled (closes: #310982)
+ See CVE-2006-5871
+ * 238_ppc-hid0-dos.diff
+ [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on
+ PPC970 at boot time
+ See CVE-2006-4093
+
+ -- dann frazier <dannf at debian.org> Tue, 5 Dec 2006 02:23:47 -0700
+
kernel-image-2.4.27-sparc (2.4.27-9sarge4) stable-security; urgency=high
* Build against kernel-tree-2.4.27-10sarge4:
Modified: dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/control
==============================================================================
--- dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/control (original)
+++ dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/control Tue Dec 5 17:48:18 2006
@@ -4,7 +4,7 @@
Maintainer: Debian Kernel Team <debian-kernel at lists.debian.org>
Uploaders: Rob Radez <rob at osinvestor.com>, Joshua Kwan <joshk at triplehelix.org>, Andres Salomon <dilinger at debian.org>
Standards-Version: 3.6.1.0
-Build-Depends: gcc (>= 4:3.3), kernel-tree-2.4.27-10sarge4, debhelper (>= 4), kernel-package, sparc-utils, modutils
+Build-Depends: gcc (>= 4:3.3), kernel-tree-2.4.27-10sarge5, debhelper (>= 4), kernel-package, sparc-utils, modutils
Package: kernel-build-2.4.27-3
Architecture: sparc
Modified: dists/sarge-security/kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian/changelog
==============================================================================
--- dists/sarge-security/kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian/changelog (original)
+++ dists/sarge-security/kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian/changelog Tue Dec 5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-image-2.6.8-alpha (2.6.8-16sarge6) stable-security; urgency=high
+
+ * Build against kernel-tree-2.6.8-16sarge6:
+ * perfmon-fd-refcnt.dpatch
+ [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+ system call which could be used as a local denial of service attack
+ by depleting the system of file descriptors
+ See CVE-2006-3741
+ * ia64-sparc-cross-region-mappings.dpatch
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * __block_prepare_write-recovery.dpatch
+ [SECURITY] Fix an information leak in __block_prepare_write()
+ See CVE-2006-4813
+ * atm-clip-freed-skb-deref.dpatch
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * ip6_flowlabel-lockup.dpatch
+ [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+ sequence handling for /proc/net/ip6_flowlabel
+ See CVE-2006-5619
+ * ppc-alignment-exception-table-check.dpatch
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * s390-uaccess-memleak.dpatch
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * smbfs-honor-mount-opts.dpatch
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled
+ See CVE-2006-5871
+ * bridge-get_fdb_entries-overflow.dpatch
+ Protect against possible overflow in get_fdb_entries
+ See CVE-2006-5751
+
+ -- dann frazier <dannf at debian.org> Tue, 5 Dec 2006 02:19:29 -0700
+
kernel-image-2.6.8-alpha (2.6.8-16sarge5) stable-security; urgency=high
* Build against kernel-tree-2.6.8-16sarge5:
Modified: dists/sarge-security/kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian/control
==============================================================================
--- dists/sarge-security/kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian/control (original)
+++ dists/sarge-security/kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian/control Tue Dec 5 17:48:18 2006
@@ -4,7 +4,7 @@
Maintainer: Debian Kernel Team <debian-kernel at lists.debian.org>
Uploaders: Norbert Tretkowski <nobse at debian.org>
Standards-Version: 3.6.1
-Build-Depends: debhelper (>= 2), kernel-package (>= 8.054), kernel-tree-2.6.8-16sarge5, module-init-tools
+Build-Depends: debhelper (>= 2), kernel-package (>= 8.054), kernel-tree-2.6.8-16sarge6, module-init-tools
Package: kernel-headers-2.6.8-3
Architecture: alpha
Modified: dists/sarge-security/kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian/changelog
==============================================================================
--- dists/sarge-security/kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian/changelog (original)
+++ dists/sarge-security/kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian/changelog Tue Dec 5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-image-2.6.8-amd64 (2.6.8-16sarge6) stable-security; urgency=high
+
+ * Build against kernel-tree-2.6.8-16sarge6:
+ * perfmon-fd-refcnt.dpatch
+ [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+ system call which could be used as a local denial of service attack
+ by depleting the system of file descriptors
+ See CVE-2006-3741
+ * ia64-sparc-cross-region-mappings.dpatch
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * __block_prepare_write-recovery.dpatch
+ [SECURITY] Fix an information leak in __block_prepare_write()
+ See CVE-2006-4813
+ * atm-clip-freed-skb-deref.dpatch
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * ip6_flowlabel-lockup.dpatch
+ [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+ sequence handling for /proc/net/ip6_flowlabel
+ See CVE-2006-5619
+ * ppc-alignment-exception-table-check.dpatch
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * s390-uaccess-memleak.dpatch
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * smbfs-honor-mount-opts.dpatch
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled
+ See CVE-2006-5871
+ * bridge-get_fdb_entries-overflow.dpatch
+ Protect against possible overflow in get_fdb_entries
+ See CVE-2006-5751
+
+ -- dann frazier <dannf at debian.org> Tue, 5 Dec 2006 02:19:56 -0700
+
kernel-image-2.6.8-amd64 (2.6.8-16sarge5) stable-security; urgency=high
* Build against kernel-tree-2.6.8-16sarge5:
Modified: dists/sarge-security/kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian/control
==============================================================================
--- dists/sarge-security/kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian/control (original)
+++ dists/sarge-security/kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian/control Tue Dec 5 17:48:18 2006
@@ -4,7 +4,7 @@
Maintainer: Debian Kernel Team <debian-kernel at lists.debian.org>
Uploaders: Frederik Schüler <fschueler at gmx.net>
Standards-Version: 3.6.1
-Build-Depends: debhelper (>= 4), kernel-package (>= 8.131), kernel-tree-2.6.8-16sarge5, module-init-tools, gcc-3.4 (>= 3.4.1-6), dpkg-dev (>= 1.10.23)
+Build-Depends: debhelper (>= 4), kernel-package (>= 8.131), kernel-tree-2.6.8-16sarge6, module-init-tools, gcc-3.4 (>= 3.4.1-6), dpkg-dev (>= 1.10.23)
Package: kernel-headers-2.6.8-12
Architecture: amd64 i386
Modified: dists/sarge-security/kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian/changelog
==============================================================================
--- dists/sarge-security/kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian/changelog (original)
+++ dists/sarge-security/kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian/changelog Tue Dec 5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-image-2.6.8-hppa (2.6.8-6sarge6) stable-security; urgency=high
+
+ * Build against kernel-tree-2.6.8-16sarge6:
+ * perfmon-fd-refcnt.dpatch
+ [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+ system call which could be used as a local denial of service attack
+ by depleting the system of file descriptors
+ See CVE-2006-3741
+ * ia64-sparc-cross-region-mappings.dpatch
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * __block_prepare_write-recovery.dpatch
+ [SECURITY] Fix an information leak in __block_prepare_write()
+ See CVE-2006-4813
+ * atm-clip-freed-skb-deref.dpatch
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * ip6_flowlabel-lockup.dpatch
+ [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+ sequence handling for /proc/net/ip6_flowlabel
+ See CVE-2006-5619
+ * ppc-alignment-exception-table-check.dpatch
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * s390-uaccess-memleak.dpatch
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * smbfs-honor-mount-opts.dpatch
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled
+ See CVE-2006-5871
+ * bridge-get_fdb_entries-overflow.dpatch
+ Protect against possible overflow in get_fdb_entries
+ See CVE-2006-5751
+
+ -- dann frazier <dannf at debian.org> Tue, 5 Dec 2006 02:20:16 -0700
+
kernel-image-2.6.8-hppa (2.6.8-6sarge5) stable-security; urgency=high
* Build against kernel-tree-2.6.8-16sarge5:
Modified: dists/sarge-security/kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian/control
==============================================================================
--- dists/sarge-security/kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian/control (original)
+++ dists/sarge-security/kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian/control Tue Dec 5 17:48:18 2006
@@ -3,7 +3,7 @@
Priority: optional
Maintainer: Kyle McMartin <kyle at debian.org>
Uploaders: Bdale Garbee <bdale at gag.com>, dann frazier <dannf at debian.org>
-Build-Depends: kernel-tree-2.6.8-16sarge5, kernel-patch-2.6.8-hppa (>= 2.6.8-5), kernel-package, debianutils (>= 1.6), debhelper (>= 2), bzip2, module-init-tools, gcc-3.3-hppa64, binutils-hppa64
+Build-Depends: kernel-tree-2.6.8-16sarge6, kernel-patch-2.6.8-hppa (>= 2.6.8-5), kernel-package, debianutils (>= 1.6), debhelper (>= 2), bzip2, module-init-tools, gcc-3.3-hppa64, binutils-hppa64
Standards-Version: 3.5.4
Package: kernel-headers-2.6.8-3
Modified: dists/sarge-security/kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian/changelog
==============================================================================
--- dists/sarge-security/kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian/changelog (original)
+++ dists/sarge-security/kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian/changelog Tue Dec 5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-image-2.6.8-i386 (2.6.8-16sarge6) stable-security; urgency=high
+
+ * Build against kernel-tree-2.6.8-16sarge6:
+ * perfmon-fd-refcnt.dpatch
+ [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+ system call which could be used as a local denial of service attack
+ by depleting the system of file descriptors
+ See CVE-2006-3741
+ * ia64-sparc-cross-region-mappings.dpatch
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * __block_prepare_write-recovery.dpatch
+ [SECURITY] Fix an information leak in __block_prepare_write()
+ See CVE-2006-4813
+ * atm-clip-freed-skb-deref.dpatch
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * ip6_flowlabel-lockup.dpatch
+ [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+ sequence handling for /proc/net/ip6_flowlabel
+ See CVE-2006-5619
+ * ppc-alignment-exception-table-check.dpatch
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * s390-uaccess-memleak.dpatch
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * smbfs-honor-mount-opts.dpatch
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled
+ See CVE-2006-5871
+ * bridge-get_fdb_entries-overflow.dpatch
+ Protect against possible overflow in get_fdb_entries
+ See CVE-2006-5751
+
+ -- dann frazier <dannf at debian.org> Tue, 5 Dec 2006 02:18:31 -0700
+
kernel-image-2.6.8-i386 (2.6.8-16sarge5) stable-security; urgency=high
* Build against kernel-tree-2.6.8-16sarge5:
Modified: dists/sarge-security/kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian/control
==============================================================================
--- dists/sarge-security/kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian/control (original)
+++ dists/sarge-security/kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian/control Tue Dec 5 17:48:18 2006
@@ -4,7 +4,7 @@
Maintainer: Debian kernel team <debian-kernel at lists.debian.org>
Uploaders: William Lee Irwin III <wli at debian.org>, Andres Salomon <dilinger at debian.org>, Simon Horman <horms at debian.org>
Standards-Version: 3.6.1
-Build-Depends: debhelper (>= 2), kernel-package (>= 8.054), kernel-tree-2.6.8-16sarge5, module-init-tools
+Build-Depends: debhelper (>= 2), kernel-package (>= 8.054), kernel-tree-2.6.8-16sarge6, module-init-tools
Package: kernel-headers-2.6.8-3
Architecture: i386
Modified: dists/sarge-security/kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian/changelog
==============================================================================
--- dists/sarge-security/kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian/changelog (original)
+++ dists/sarge-security/kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian/changelog Tue Dec 5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-image-2.6.8-ia64 (2.6.8-14sarge6) stable-security; urgency=high
+
+ * Build against kernel-tree-2.6.8-16sarge6:
+ * perfmon-fd-refcnt.dpatch
+ [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+ system call which could be used as a local denial of service attack
+ by depleting the system of file descriptors
+ See CVE-2006-3741
+ * ia64-sparc-cross-region-mappings.dpatch
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * __block_prepare_write-recovery.dpatch
+ [SECURITY] Fix an information leak in __block_prepare_write()
+ See CVE-2006-4813
+ * atm-clip-freed-skb-deref.dpatch
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * ip6_flowlabel-lockup.dpatch
+ [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+ sequence handling for /proc/net/ip6_flowlabel
+ See CVE-2006-5619
+ * ppc-alignment-exception-table-check.dpatch
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * s390-uaccess-memleak.dpatch
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * smbfs-honor-mount-opts.dpatch
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled
+ See CVE-2006-5871
+ * bridge-get_fdb_entries-overflow.dpatch
+ Protect against possible overflow in get_fdb_entries
+ See CVE-2006-5751
+
+ -- dann frazier <dannf at debian.org> Tue, 5 Dec 2006 02:20:33 -0700
+
kernel-image-2.6.8-ia64 (2.6.8-14sarge5) stable-security; urgency=high
* Build against kernel-tree-2.6.8-16sarge5:
Modified: dists/sarge-security/kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian/control
==============================================================================
--- dists/sarge-security/kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian/control (original)
+++ dists/sarge-security/kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian/control Tue Dec 5 17:48:18 2006
@@ -4,7 +4,7 @@
Maintainer: Debian Kernel Team <debian-kernel at lists.debian.org>
Uploaders: dann frazier <dannf at debian.org>
Standards-Version: 3.6.1
-Build-Depends: debhelper (>= 2), kernel-package (>= 8.054), kernel-tree-2.6.8-16sarge5, module-init-tools
+Build-Depends: debhelper (>= 2), kernel-package (>= 8.054), kernel-tree-2.6.8-16sarge6, module-init-tools
Package: kernel-headers-2.6.8-3
Architecture: ia64
Modified: dists/sarge-security/kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian/changelog
==============================================================================
--- dists/sarge-security/kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian/changelog (original)
+++ dists/sarge-security/kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian/changelog Tue Dec 5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-image-2.6.8-m68k (2.6.8-4sarge6) stable-security; urgency=high
+
+ * Build against kernel-tree-2.6.8-16sarge6:
+ * perfmon-fd-refcnt.dpatch
+ [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+ system call which could be used as a local denial of service attack
+ by depleting the system of file descriptors
+ See CVE-2006-3741
+ * ia64-sparc-cross-region-mappings.dpatch
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * __block_prepare_write-recovery.dpatch
+ [SECURITY] Fix an information leak in __block_prepare_write()
+ See CVE-2006-4813
+ * atm-clip-freed-skb-deref.dpatch
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * ip6_flowlabel-lockup.dpatch
+ [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+ sequence handling for /proc/net/ip6_flowlabel
+ See CVE-2006-5619
+ * ppc-alignment-exception-table-check.dpatch
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * s390-uaccess-memleak.dpatch
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * smbfs-honor-mount-opts.dpatch
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled
+ See CVE-2006-5871
+ * bridge-get_fdb_entries-overflow.dpatch
+ Protect against possible overflow in get_fdb_entries
+ See CVE-2006-5751
+
+ -- dann frazier <dannf at debian.org> Tue, 5 Dec 2006 02:20:58 -0700
+
kernel-image-2.6.8-m68k (2.6.8-4sarge5) stable-security; urgency=high
* Build against kernel-tree-2.6.8-16sarge5:
Modified: dists/sarge-security/kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian/control
==============================================================================
--- dists/sarge-security/kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian/control (original)
+++ dists/sarge-security/kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian/control Tue Dec 5 17:48:18 2006
@@ -3,7 +3,7 @@
Priority: optional
Maintainer: Christian T. Steigies <cts at debian.org>
Standards-Version: 3.6.1
-Build-Depends: kernel-tree-2.6.8-16sarge5, kernel-patch-2.6.8-m68k, kernel-package, debhelper, bzip2, console-tools
+Build-Depends: kernel-tree-2.6.8-16sarge6, kernel-patch-2.6.8-m68k, kernel-package, debhelper, bzip2, console-tools
Package: kernel-image-2.6.8-amiga
Section: base
Modified: dists/sarge-security/kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian/changelog
==============================================================================
--- dists/sarge-security/kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian/changelog (original)
+++ dists/sarge-security/kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian/changelog Tue Dec 5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-patch-powerpc-2.6.8 (2.6.8-12sarge6) stable-security; urgency=high
+
+ * Build against kernel-tree-2.6.8-16sarge6:
+ * perfmon-fd-refcnt.dpatch
+ [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+ system call which could be used as a local denial of service attack
+ by depleting the system of file descriptors
+ See CVE-2006-3741
+ * ia64-sparc-cross-region-mappings.dpatch
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * __block_prepare_write-recovery.dpatch
+ [SECURITY] Fix an information leak in __block_prepare_write()
+ See CVE-2006-4813
+ * atm-clip-freed-skb-deref.dpatch
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * ip6_flowlabel-lockup.dpatch
+ [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+ sequence handling for /proc/net/ip6_flowlabel
+ See CVE-2006-5619
+ * ppc-alignment-exception-table-check.dpatch
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * s390-uaccess-memleak.dpatch
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * smbfs-honor-mount-opts.dpatch
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled
+ See CVE-2006-5871
+ * bridge-get_fdb_entries-overflow.dpatch
+ Protect against possible overflow in get_fdb_entries
+ See CVE-2006-5751
+
+ -- dann frazier <dannf at debian.org> Tue, 5 Dec 2006 02:21:34 -0700
+
kernel-patch-powerpc-2.6.8 (2.6.8-12sarge5) stable-security; urgency=high
* Build against kernel-tree-2.6.8-16sarge5:
Modified: dists/sarge-security/kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian/rules
==============================================================================
--- dists/sarge-security/kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian/rules (original)
+++ dists/sarge-security/kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian/rules Tue Dec 5 17:48:18 2006
@@ -11,7 +11,7 @@
OFFICIAL_VERSION = No
# This is the kernel-tree version we build against
-ktver = 16sarge5
+ktver = 16sarge6
# set the build architecture if necessary
DEB_HOST_ARCH ?= $(shell dpkg --print-architecture)
Modified: dists/sarge-security/kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian/changelog
==============================================================================
--- dists/sarge-security/kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian/changelog (original)
+++ dists/sarge-security/kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian/changelog Tue Dec 5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-image-2.6.8-s390 (2.6.8-5sarge6) stable-security; urgency=high
+
+ * Build against kernel-tree-2.6.8-16sarge6:
+ * perfmon-fd-refcnt.dpatch
+ [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+ system call which could be used as a local denial of service attack
+ by depleting the system of file descriptors
+ See CVE-2006-3741
+ * ia64-sparc-cross-region-mappings.dpatch
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * __block_prepare_write-recovery.dpatch
+ [SECURITY] Fix an information leak in __block_prepare_write()
+ See CVE-2006-4813
+ * atm-clip-freed-skb-deref.dpatch
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * ip6_flowlabel-lockup.dpatch
+ [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+ sequence handling for /proc/net/ip6_flowlabel
+ See CVE-2006-5619
+ * ppc-alignment-exception-table-check.dpatch
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * s390-uaccess-memleak.dpatch
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * smbfs-honor-mount-opts.dpatch
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled
+ See CVE-2006-5871
+ * bridge-get_fdb_entries-overflow.dpatch
+ Protect against possible overflow in get_fdb_entries
+ See CVE-2006-5751
+
+ -- dann frazier <dannf at debian.org> Tue, 5 Dec 2006 02:21:43 -0700
+
kernel-image-2.6.8-s390 (2.6.8-5sarge5) stable-security; urgency=high
* Build against kernel-tree-2.6.8-16sarge5:
Modified: dists/sarge-security/kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian/control
==============================================================================
--- dists/sarge-security/kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian/control (original)
+++ dists/sarge-security/kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian/control Tue Dec 5 17:48:18 2006
@@ -4,7 +4,7 @@
Maintainer: Debian kernel team <debian-kernel at lists.debian.org>
Uploaders: Bastian Blank <waldi at debian.org>, Jochen Röhrig <jr at debian.org>
Standards-Version: 3.5.6
-Build-Depends: debhelper (>> 4.0.0), module-init-tools, kernel-tree-2.6.8-16sarge5, kernel-package (>= 8.084), dh-kpatches
+Build-Depends: debhelper (>> 4.0.0), module-init-tools, kernel-tree-2.6.8-16sarge6, kernel-package (>= 8.084), dh-kpatches
Package: kernel-patch-2.6.8-s390
Architecture: all
Modified: dists/sarge-security/kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian/changelog
==============================================================================
--- dists/sarge-security/kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian/changelog (original)
+++ dists/sarge-security/kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian/changelog Tue Dec 5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-image-2.6.8-sparc (2.6.8-15sarge6) stable-security; urgency=high
+
+ * Build against kernel-tree-2.6.8-16sarge6:
+ * perfmon-fd-refcnt.dpatch
+ [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+ system call which could be used as a local denial of service attack
+ by depleting the system of file descriptors
+ See CVE-2006-3741
+ * ia64-sparc-cross-region-mappings.dpatch
+ [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+ could be used in a local DoS attack (system crash)
+ See CVE-2006-4538
+ * __block_prepare_write-recovery.dpatch
+ [SECURITY] Fix an information leak in __block_prepare_write()
+ See CVE-2006-4813
+ * atm-clip-freed-skb-deref.dpatch
+ [SECURITY] Avoid dereferencing an already freed skb, preventing a
+ potential remote DoS (system crash) vector
+ See CVE-2006-4997
+ * ip6_flowlabel-lockup.dpatch
+ [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+ sequence handling for /proc/net/ip6_flowlabel
+ See CVE-2006-5619
+ * ppc-alignment-exception-table-check.dpatch
+ [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+ futex ops
+ See CVE-2006-5649
+ * s390-uaccess-memleak.dpatch
+ [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+ remaining bytes of the kernel buffer after a fault on the userspace
+ address in copy_from_user()
+ See CVE-2006-5174
+ * smbfs-honor-mount-opts.dpatch
+ Honor uid, gid and mode mount options for smbfs even when unix extensions
+ are enabled
+ See CVE-2006-5871
+ * bridge-get_fdb_entries-overflow.dpatch
+ Protect against possible overflow in get_fdb_entries
+ See CVE-2006-5751
+
+ -- dann frazier <dannf at debian.org> Tue, 5 Dec 2006 02:21:54 -0700
+
kernel-image-2.6.8-sparc (2.6.8-15sarge5) stable-security; urgency=high
* Build against kernel-tree-2.6.8-16sarge5:
Modified: dists/sarge-security/kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian/control
==============================================================================
--- dists/sarge-security/kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian/control (original)
+++ dists/sarge-security/kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian/control Tue Dec 5 17:48:18 2006
@@ -4,7 +4,7 @@
Maintainer: Debian Kernel Team <debian-kernel at lists.debian.org>
Uploaders: Joshua Kwan <joshk at triplehelix.org>, Ben Collins <bcollins at debian.org>, Andres Salomon <dilinger at debian.org>, dann frazier <dannf at debian.org>
Standards-Version: 3.6.1.0
-Build-Depends: gcc (>= 4:3.3), kernel-tree-2.6.8-16sarge5, debhelper (>= 4), kernel-package, sparc-utils, module-init-tools
+Build-Depends: gcc (>= 4:3.3), kernel-tree-2.6.8-16sarge6, debhelper (>= 4), kernel-package, sparc-utils, module-init-tools
Package: kernel-build-2.6.8-3
Architecture: sparc
More information about the Kernel-svn-changes
mailing list