[kernel] r7941 - in dists/sarge-security: kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian kernel-2.4/mips/kernel-patch-2.4.27-mips/debian kernel-2.4/powerpc/kernel-patch-powerpc-2.4.27-2.4.27/debian kernel-2.4/s390/kernel-image-2.4.27-s390/debian kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian

Dann Frazier dannf at alioth.debian.org
Tue Dec 5 16:48:23 UTC 2006


Author: dannf
Date: Tue Dec  5 17:48:18 2006
New Revision: 7941

Modified:
   dists/sarge-security/kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian/changelog
   dists/sarge-security/kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian/control
   dists/sarge-security/kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian/changelog
   dists/sarge-security/kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian/control
   dists/sarge-security/kernel-2.4/mips/kernel-patch-2.4.27-mips/debian/changelog
   dists/sarge-security/kernel-2.4/mips/kernel-patch-2.4.27-mips/debian/control
   dists/sarge-security/kernel-2.4/powerpc/kernel-patch-powerpc-2.4.27-2.4.27/debian/changelog
   dists/sarge-security/kernel-2.4/s390/kernel-image-2.4.27-s390/debian/changelog
   dists/sarge-security/kernel-2.4/s390/kernel-image-2.4.27-s390/debian/control
   dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog
   dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/changelog
   dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/control
   dists/sarge-security/kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian/changelog
   dists/sarge-security/kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian/control
   dists/sarge-security/kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian/changelog
   dists/sarge-security/kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian/control
   dists/sarge-security/kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian/changelog
   dists/sarge-security/kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian/control
   dists/sarge-security/kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian/changelog
   dists/sarge-security/kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian/control
   dists/sarge-security/kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian/changelog
   dists/sarge-security/kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian/control
   dists/sarge-security/kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian/changelog
   dists/sarge-security/kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian/control
   dists/sarge-security/kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian/changelog
   dists/sarge-security/kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian/rules
   dists/sarge-security/kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian/changelog
   dists/sarge-security/kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian/control
   dists/sarge-security/kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian/changelog
   dists/sarge-security/kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian/control
Log:
preparing kernel-image packages for round 6 of sarge updates

Modified: dists/sarge-security/kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian/changelog
==============================================================================
--- dists/sarge-security/kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian/changelog	(original)
+++ dists/sarge-security/kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian/changelog	Tue Dec  5 17:48:18 2006
@@ -1,3 +1,34 @@
+kernel-image-2.4.27-ia64 (2.4.27-10sarge5) stable-security; urgency=high
+
+  * Build against kernel-tree-2.4.27-10sarge5:
+    * 233_ia64-sparc-cross-region-mappings.diff
+      [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+      could be used in a local DoS attack (system crash)
+      See CVE-2006-4538
+    * 234_atm-clip-freed-skb-deref.diff
+      [SECURITY] Avoid dereferencing an already freed skb, preventing a
+      potential remote DoS (system crash) vector
+      See CVE-2006-4997
+    * 235_ppc-alignment-exception-table-check.diff
+      [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+      futex ops
+      See CVE-2006-5649
+    * 236_s390-uaccess-memleak.diff
+      [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+      remaining bytes of the kernel buffer after a fault on the userspace
+      address in copy_from_user()
+      See CVE-2006-5174
+    * 237_smbfs-honor-mount-opts.diff
+      Honor uid, gid and mode mount options for smbfs even when unix extensions
+      are enabled (closes: #310982)
+      See CVE-2006-5871
+    * 238_ppc-hid0-dos.diff
+      [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on
+      PPC970 at boot time
+      See CVE-2006-4093
+
+ -- dann frazier <dannf at debian.org>  Tue,  5 Dec 2006 02:22:55 -0700
+
 kernel-image-2.4.27-ia64 (2.4.27-10sarge4) stable-security; urgency=high
 
   * Build against kernel-tree-2.4.27-10sarge4:

Modified: dists/sarge-security/kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian/control
==============================================================================
--- dists/sarge-security/kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian/control	(original)
+++ dists/sarge-security/kernel-2.4/ia64/kernel-image-2.4.27-ia64-2.4.27/debian/control	Tue Dec  5 17:48:18 2006
@@ -4,7 +4,7 @@
 Maintainer: Debian Kernel Team <debian-kernel at lists.debian.org>
 Uploaders: dann frazier <dannf at debian.org>
 Standards-Version: 3.6.1
-Build-Depends: debhelper (>= 2), modutils, kernel-patch-2.4.27-ia64 (= 2.4.27-4), kernel-tree-2.4.27-10sarge4, kernel-package (>= 8.042), bzip2
+Build-Depends: debhelper (>= 2), modutils, kernel-patch-2.4.27-ia64 (= 2.4.27-4), kernel-tree-2.4.27-10sarge5, kernel-package (>= 8.042), bzip2
 
 Package: kernel-headers-2.4.27-3
 Architecture: ia64

Modified: dists/sarge-security/kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian/changelog
==============================================================================
--- dists/sarge-security/kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian/changelog	(original)
+++ dists/sarge-security/kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian/changelog	Tue Dec  5 17:48:18 2006
@@ -1,3 +1,34 @@
+kernel-image-2.4.27-m68k (2.4.27-3sarge5) stable-security; urgency=high
+
+  * Build against kernel-tree-2.4.27-10sarge5:
+    * 233_ia64-sparc-cross-region-mappings.diff
+      [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+      could be used in a local DoS attack (system crash)
+      See CVE-2006-4538
+    * 234_atm-clip-freed-skb-deref.diff
+      [SECURITY] Avoid dereferencing an already freed skb, preventing a
+      potential remote DoS (system crash) vector
+      See CVE-2006-4997
+    * 235_ppc-alignment-exception-table-check.diff
+      [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+      futex ops
+      See CVE-2006-5649
+    * 236_s390-uaccess-memleak.diff
+      [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+      remaining bytes of the kernel buffer after a fault on the userspace
+      address in copy_from_user()
+      See CVE-2006-5174
+    * 237_smbfs-honor-mount-opts.diff
+      Honor uid, gid and mode mount options for smbfs even when unix extensions
+      are enabled (closes: #310982)
+      See CVE-2006-5871
+    * 238_ppc-hid0-dos.diff
+      [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on
+      PPC970 at boot time
+      See CVE-2006-4093
+
+ -- dann frazier <dannf at debian.org>  Tue,  5 Dec 2006 02:23:02 -0700
+
 kernel-image-2.4.27-m68k (2.4.27-3sarge4) stable-security; urgency=high
 
   * Build against kernel-tree-2.4.27-10sarge4:

Modified: dists/sarge-security/kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian/control
==============================================================================
--- dists/sarge-security/kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian/control	(original)
+++ dists/sarge-security/kernel-2.4/m68k/kernel-image-2.4.27-m68k-2.4.27/debian/control	Tue Dec  5 17:48:18 2006
@@ -3,7 +3,7 @@
 Priority: optional
 Maintainer:  Christian T. Steigies <cts at debian.org>
 Standards-Version: 3.6.1
-Build-Depends: kernel-tree-2.4.27-10sarge4, kernel-patch-2.4.27-m68k, kernel-package, debhelper, bzip2, console-tools, gcc-2.95
+Build-Depends: kernel-tree-2.4.27-10sarge5, kernel-patch-2.4.27-m68k, kernel-package, debhelper, bzip2, console-tools, gcc-2.95
 
 Package: kernel-image-2.4.27-amiga
 Section: base

Modified: dists/sarge-security/kernel-2.4/mips/kernel-patch-2.4.27-mips/debian/changelog
==============================================================================
--- dists/sarge-security/kernel-2.4/mips/kernel-patch-2.4.27-mips/debian/changelog	(original)
+++ dists/sarge-security/kernel-2.4/mips/kernel-patch-2.4.27-mips/debian/changelog	Tue Dec  5 17:48:18 2006
@@ -1,3 +1,34 @@
+kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-2) stable-security; urgency=high
+
+  * Build against kernel-tree-2.4.27-10sarge5:
+    * 233_ia64-sparc-cross-region-mappings.diff
+      [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+      could be used in a local DoS attack (system crash)
+      See CVE-2006-4538
+    * 234_atm-clip-freed-skb-deref.diff
+      [SECURITY] Avoid dereferencing an already freed skb, preventing a
+      potential remote DoS (system crash) vector
+      See CVE-2006-4997
+    * 235_ppc-alignment-exception-table-check.diff
+      [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+      futex ops
+      See CVE-2006-5649
+    * 236_s390-uaccess-memleak.diff
+      [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+      remaining bytes of the kernel buffer after a fault on the userspace
+      address in copy_from_user()
+      See CVE-2006-5174
+    * 237_smbfs-honor-mount-opts.diff
+      Honor uid, gid and mode mount options for smbfs even when unix extensions
+      are enabled (closes: #310982)
+      See CVE-2006-5871
+    * 238_ppc-hid0-dos.diff
+      [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on
+      PPC970 at boot time
+      See CVE-2006-4093
+
+ -- dann frazier <dannf at debian.org>  Tue,  5 Dec 2006 02:23:13 -0700
+
 kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-1) stable-security; urgency=high
 
   * Build against kernel-tree-2.4.27-10sarge4:

Modified: dists/sarge-security/kernel-2.4/mips/kernel-patch-2.4.27-mips/debian/control
==============================================================================
--- dists/sarge-security/kernel-2.4/mips/kernel-patch-2.4.27-mips/debian/control	(original)
+++ dists/sarge-security/kernel-2.4/mips/kernel-patch-2.4.27-mips/debian/control	Tue Dec  5 17:48:18 2006
@@ -3,7 +3,7 @@
 Priority: optional
 Maintainer: Debian kernel team <debian-kernel at lists.debian.org>
 Uploaders: Guido Guenther <agx at debian.org>, Karsten Merker <merker at debian.org>, Thiemo Seufer <ths at debian.org>
-Build-Depends: kernel-tree-2.4.27-10sarge4, kernel-package, debhelper (>=4.1.0), modutils, console-tools, dpatch, bzip2
+Build-Depends: kernel-tree-2.4.27-10sarge5, kernel-package, debhelper (>=4.1.0), modutils, console-tools, dpatch, bzip2
 Standards-Version: 3.6.1
 
 Package: kernel-headers-2.4.27

Modified: dists/sarge-security/kernel-2.4/powerpc/kernel-patch-powerpc-2.4.27-2.4.27/debian/changelog
==============================================================================
--- dists/sarge-security/kernel-2.4/powerpc/kernel-patch-powerpc-2.4.27-2.4.27/debian/changelog	(original)
+++ dists/sarge-security/kernel-2.4/powerpc/kernel-patch-powerpc-2.4.27-2.4.27/debian/changelog	Tue Dec  5 17:48:18 2006
@@ -1,3 +1,34 @@
+kernel-patch-powerpc-2.4.27 (2.4.27-10sarge5) stable-security; urgency=high
+
+  * Build against kernel-tree-2.4.27-10sarge5:
+    * 233_ia64-sparc-cross-region-mappings.diff
+      [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+      could be used in a local DoS attack (system crash)
+      See CVE-2006-4538
+    * 234_atm-clip-freed-skb-deref.diff
+      [SECURITY] Avoid dereferencing an already freed skb, preventing a
+      potential remote DoS (system crash) vector
+      See CVE-2006-4997
+    * 235_ppc-alignment-exception-table-check.diff
+      [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+      futex ops
+      See CVE-2006-5649
+    * 236_s390-uaccess-memleak.diff
+      [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+      remaining bytes of the kernel buffer after a fault on the userspace
+      address in copy_from_user()
+      See CVE-2006-5174
+    * 237_smbfs-honor-mount-opts.diff
+      Honor uid, gid and mode mount options for smbfs even when unix extensions
+      are enabled (closes: #310982)
+      See CVE-2006-5871
+    * 238_ppc-hid0-dos.diff
+      [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on
+      PPC970 at boot time
+      See CVE-2006-4093
+
+ -- dann frazier <dannf at debian.org>  Tue,  5 Dec 2006 02:23:21 -0700
+
 kernel-patch-powerpc-2.4.27 (2.4.27-10sarge4) stable-security; urgency=high
 
   * Build against kernel-tree-2.4.27-10sarge4:

Modified: dists/sarge-security/kernel-2.4/s390/kernel-image-2.4.27-s390/debian/changelog
==============================================================================
--- dists/sarge-security/kernel-2.4/s390/kernel-image-2.4.27-s390/debian/changelog	(original)
+++ dists/sarge-security/kernel-2.4/s390/kernel-image-2.4.27-s390/debian/changelog	Tue Dec  5 17:48:18 2006
@@ -1,3 +1,34 @@
+kernel-image-2.4.27-s390 (2.4.27-2sarge5) stable-security; urgency=high
+
+  * Build against kernel-tree-2.4.27-10sarge5:
+    * 233_ia64-sparc-cross-region-mappings.diff
+      [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+      could be used in a local DoS attack (system crash)
+      See CVE-2006-4538
+    * 234_atm-clip-freed-skb-deref.diff
+      [SECURITY] Avoid dereferencing an already freed skb, preventing a
+      potential remote DoS (system crash) vector
+      See CVE-2006-4997
+    * 235_ppc-alignment-exception-table-check.diff
+      [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+      futex ops
+      See CVE-2006-5649
+    * 236_s390-uaccess-memleak.diff
+      [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+      remaining bytes of the kernel buffer after a fault on the userspace
+      address in copy_from_user()
+      See CVE-2006-5174
+    * 237_smbfs-honor-mount-opts.diff
+      Honor uid, gid and mode mount options for smbfs even when unix extensions
+      are enabled (closes: #310982)
+      See CVE-2006-5871
+    * 238_ppc-hid0-dos.diff
+      [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on
+      PPC970 at boot time
+      See CVE-2006-4093
+
+ -- dann frazier <dannf at debian.org>  Tue,  5 Dec 2006 02:23:35 -0700
+
 kernel-image-2.4.27-s390 (2.4.27-2sarge4) stable-security; urgency=high
 
   * Build against kernel-tree-2.4.27-10sarge4:

Modified: dists/sarge-security/kernel-2.4/s390/kernel-image-2.4.27-s390/debian/control
==============================================================================
--- dists/sarge-security/kernel-2.4/s390/kernel-image-2.4.27-s390/debian/control	(original)
+++ dists/sarge-security/kernel-2.4/s390/kernel-image-2.4.27-s390/debian/control	Tue Dec  5 17:48:18 2006
@@ -4,7 +4,7 @@
 Maintainer: Debian S/390 Team <debian-s390 at lists.debian.org>
 Uploaders: Bastian Blank <waldi at debian.org>
 Standards-Version: 3.5.6
-Build-Depends: debhelper (>> 4.0.0), modutils (>= 2.4.21), kernel-tree-2.4.27-10sarge4, kernel-patch-2.4.27-s390 (>= 2.4.27-2sarge1), kernel-package (>= 8.084)
+Build-Depends: debhelper (>> 4.0.0), modutils (>= 2.4.21), kernel-tree-2.4.27-10sarge5, kernel-patch-2.4.27-s390 (>= 2.4.27-2sarge1), kernel-package (>= 8.084)
 
 Package: kernel-headers-2.4.27-3
 Architecture: s390

Modified: dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog
==============================================================================
--- dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog	(original)
+++ dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog	Tue Dec  5 17:48:18 2006
@@ -1,4 +1,4 @@
-kernel-source-2.4.27 (2.4.27-10sarge5) UNRELEASED; urgency=low
+kernel-source-2.4.27 (2.4.27-10sarge5) stable-security; urgency=high
 
   * 233_ia64-sparc-cross-region-mappings.diff
     [SECURITY] Prevent cross-region mappings on ia64 and sparc which

Modified: dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/changelog
==============================================================================
--- dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/changelog	(original)
+++ dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/changelog	Tue Dec  5 17:48:18 2006
@@ -1,3 +1,34 @@
+kernel-image-2.4.27-sparc (2.4.27-9sarge5) stable-security; urgency=high
+
+  * Build against kernel-tree-2.4.27-10sarge5:
+    * 233_ia64-sparc-cross-region-mappings.diff
+      [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+      could be used in a local DoS attack (system crash)
+      See CVE-2006-4538
+    * 234_atm-clip-freed-skb-deref.diff
+      [SECURITY] Avoid dereferencing an already freed skb, preventing a
+      potential remote DoS (system crash) vector
+      See CVE-2006-4997
+    * 235_ppc-alignment-exception-table-check.diff
+      [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+      futex ops
+      See CVE-2006-5649
+    * 236_s390-uaccess-memleak.diff
+      [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+      remaining bytes of the kernel buffer after a fault on the userspace
+      address in copy_from_user()
+      See CVE-2006-5174
+    * 237_smbfs-honor-mount-opts.diff
+      Honor uid, gid and mode mount options for smbfs even when unix extensions
+      are enabled (closes: #310982)
+      See CVE-2006-5871
+    * 238_ppc-hid0-dos.diff
+      [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on
+      PPC970 at boot time
+      See CVE-2006-4093
+
+ -- dann frazier <dannf at debian.org>  Tue,  5 Dec 2006 02:23:47 -0700
+
 kernel-image-2.4.27-sparc (2.4.27-9sarge4) stable-security; urgency=high
 
   * Build against kernel-tree-2.4.27-10sarge4:

Modified: dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/control
==============================================================================
--- dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/control	(original)
+++ dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/control	Tue Dec  5 17:48:18 2006
@@ -4,7 +4,7 @@
 Maintainer: Debian Kernel Team <debian-kernel at lists.debian.org>
 Uploaders: Rob Radez <rob at osinvestor.com>, Joshua Kwan <joshk at triplehelix.org>, Andres Salomon <dilinger at debian.org>
 Standards-Version: 3.6.1.0
-Build-Depends: gcc (>= 4:3.3), kernel-tree-2.4.27-10sarge4, debhelper (>= 4), kernel-package, sparc-utils, modutils
+Build-Depends: gcc (>= 4:3.3), kernel-tree-2.4.27-10sarge5, debhelper (>= 4), kernel-package, sparc-utils, modutils
 
 Package: kernel-build-2.4.27-3
 Architecture: sparc

Modified: dists/sarge-security/kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian/changelog
==============================================================================
--- dists/sarge-security/kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian/changelog	(original)
+++ dists/sarge-security/kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian/changelog	Tue Dec  5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-image-2.6.8-alpha (2.6.8-16sarge6) stable-security; urgency=high
+
+  * Build against kernel-tree-2.6.8-16sarge6:
+    * perfmon-fd-refcnt.dpatch
+      [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+      system call which could be used as a local denial of service attack
+      by depleting the system of file descriptors
+      See CVE-2006-3741
+    * ia64-sparc-cross-region-mappings.dpatch
+      [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+      could be used in a local DoS attack (system crash)
+      See CVE-2006-4538
+    * __block_prepare_write-recovery.dpatch
+      [SECURITY] Fix an information leak in __block_prepare_write()
+      See CVE-2006-4813
+    * atm-clip-freed-skb-deref.dpatch
+      [SECURITY] Avoid dereferencing an already freed skb, preventing a
+      potential remote DoS (system crash) vector
+      See CVE-2006-4997
+    * ip6_flowlabel-lockup.dpatch
+      [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+      sequence handling for /proc/net/ip6_flowlabel
+      See CVE-2006-5619
+    * ppc-alignment-exception-table-check.dpatch
+      [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+      futex ops
+      See CVE-2006-5649
+    * s390-uaccess-memleak.dpatch
+      [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+      remaining bytes of the kernel buffer after a fault on the userspace
+      address in copy_from_user()
+      See CVE-2006-5174
+    * smbfs-honor-mount-opts.dpatch
+      Honor uid, gid and mode mount options for smbfs even when unix extensions
+      are enabled
+      See CVE-2006-5871
+    * bridge-get_fdb_entries-overflow.dpatch
+      Protect against possible overflow in get_fdb_entries
+      See CVE-2006-5751
+
+ -- dann frazier <dannf at debian.org>  Tue,  5 Dec 2006 02:19:29 -0700
+
 kernel-image-2.6.8-alpha (2.6.8-16sarge5) stable-security; urgency=high
 
   * Build against kernel-tree-2.6.8-16sarge5:

Modified: dists/sarge-security/kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian/control
==============================================================================
--- dists/sarge-security/kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian/control	(original)
+++ dists/sarge-security/kernel/alpha/kernel-image-2.6.8-alpha-2.6.8/debian/control	Tue Dec  5 17:48:18 2006
@@ -4,7 +4,7 @@
 Maintainer: Debian Kernel Team <debian-kernel at lists.debian.org>
 Uploaders: Norbert Tretkowski <nobse at debian.org>
 Standards-Version: 3.6.1
-Build-Depends: debhelper (>= 2), kernel-package (>= 8.054), kernel-tree-2.6.8-16sarge5, module-init-tools
+Build-Depends: debhelper (>= 2), kernel-package (>= 8.054), kernel-tree-2.6.8-16sarge6, module-init-tools
 
 Package: kernel-headers-2.6.8-3
 Architecture: alpha

Modified: dists/sarge-security/kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian/changelog
==============================================================================
--- dists/sarge-security/kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian/changelog	(original)
+++ dists/sarge-security/kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian/changelog	Tue Dec  5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-image-2.6.8-amd64 (2.6.8-16sarge6) stable-security; urgency=high
+
+  * Build against kernel-tree-2.6.8-16sarge6:
+    * perfmon-fd-refcnt.dpatch
+      [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+      system call which could be used as a local denial of service attack
+      by depleting the system of file descriptors
+      See CVE-2006-3741
+    * ia64-sparc-cross-region-mappings.dpatch
+      [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+      could be used in a local DoS attack (system crash)
+      See CVE-2006-4538
+    * __block_prepare_write-recovery.dpatch
+      [SECURITY] Fix an information leak in __block_prepare_write()
+      See CVE-2006-4813
+    * atm-clip-freed-skb-deref.dpatch
+      [SECURITY] Avoid dereferencing an already freed skb, preventing a
+      potential remote DoS (system crash) vector
+      See CVE-2006-4997
+    * ip6_flowlabel-lockup.dpatch
+      [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+      sequence handling for /proc/net/ip6_flowlabel
+      See CVE-2006-5619
+    * ppc-alignment-exception-table-check.dpatch
+      [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+      futex ops
+      See CVE-2006-5649
+    * s390-uaccess-memleak.dpatch
+      [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+      remaining bytes of the kernel buffer after a fault on the userspace
+      address in copy_from_user()
+      See CVE-2006-5174
+    * smbfs-honor-mount-opts.dpatch
+      Honor uid, gid and mode mount options for smbfs even when unix extensions
+      are enabled
+      See CVE-2006-5871
+    * bridge-get_fdb_entries-overflow.dpatch
+      Protect against possible overflow in get_fdb_entries
+      See CVE-2006-5751
+
+ -- dann frazier <dannf at debian.org>  Tue,  5 Dec 2006 02:19:56 -0700
+
 kernel-image-2.6.8-amd64 (2.6.8-16sarge5) stable-security; urgency=high
 
   * Build against kernel-tree-2.6.8-16sarge5:

Modified: dists/sarge-security/kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian/control
==============================================================================
--- dists/sarge-security/kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian/control	(original)
+++ dists/sarge-security/kernel/amd64/kernel-image-2.6.8-amd64-2.6.8/debian/control	Tue Dec  5 17:48:18 2006
@@ -4,7 +4,7 @@
 Maintainer: Debian Kernel Team <debian-kernel at lists.debian.org>
 Uploaders: Frederik Schüler <fschueler at gmx.net> 
 Standards-Version: 3.6.1
-Build-Depends: debhelper (>= 4), kernel-package (>= 8.131), kernel-tree-2.6.8-16sarge5, module-init-tools, gcc-3.4 (>= 3.4.1-6), dpkg-dev (>= 1.10.23)
+Build-Depends: debhelper (>= 4), kernel-package (>= 8.131), kernel-tree-2.6.8-16sarge6, module-init-tools, gcc-3.4 (>= 3.4.1-6), dpkg-dev (>= 1.10.23)
 
 Package: kernel-headers-2.6.8-12
 Architecture: amd64 i386

Modified: dists/sarge-security/kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian/changelog
==============================================================================
--- dists/sarge-security/kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian/changelog	(original)
+++ dists/sarge-security/kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian/changelog	Tue Dec  5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-image-2.6.8-hppa (2.6.8-6sarge6) stable-security; urgency=high
+
+  * Build against kernel-tree-2.6.8-16sarge6:
+    * perfmon-fd-refcnt.dpatch
+      [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+      system call which could be used as a local denial of service attack
+      by depleting the system of file descriptors
+      See CVE-2006-3741
+    * ia64-sparc-cross-region-mappings.dpatch
+      [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+      could be used in a local DoS attack (system crash)
+      See CVE-2006-4538
+    * __block_prepare_write-recovery.dpatch
+      [SECURITY] Fix an information leak in __block_prepare_write()
+      See CVE-2006-4813
+    * atm-clip-freed-skb-deref.dpatch
+      [SECURITY] Avoid dereferencing an already freed skb, preventing a
+      potential remote DoS (system crash) vector
+      See CVE-2006-4997
+    * ip6_flowlabel-lockup.dpatch
+      [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+      sequence handling for /proc/net/ip6_flowlabel
+      See CVE-2006-5619
+    * ppc-alignment-exception-table-check.dpatch
+      [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+      futex ops
+      See CVE-2006-5649
+    * s390-uaccess-memleak.dpatch
+      [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+      remaining bytes of the kernel buffer after a fault on the userspace
+      address in copy_from_user()
+      See CVE-2006-5174
+    * smbfs-honor-mount-opts.dpatch
+      Honor uid, gid and mode mount options for smbfs even when unix extensions
+      are enabled
+      See CVE-2006-5871
+    * bridge-get_fdb_entries-overflow.dpatch
+      Protect against possible overflow in get_fdb_entries
+      See CVE-2006-5751
+
+ -- dann frazier <dannf at debian.org>  Tue,  5 Dec 2006 02:20:16 -0700
+
 kernel-image-2.6.8-hppa (2.6.8-6sarge5) stable-security; urgency=high
 
   * Build against kernel-tree-2.6.8-16sarge5:

Modified: dists/sarge-security/kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian/control
==============================================================================
--- dists/sarge-security/kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian/control	(original)
+++ dists/sarge-security/kernel/hppa/kernel-image-2.6.8-hppa-2.6.8/debian/control	Tue Dec  5 17:48:18 2006
@@ -3,7 +3,7 @@
 Priority: optional
 Maintainer: Kyle McMartin <kyle at debian.org>
 Uploaders: Bdale Garbee <bdale at gag.com>, dann frazier <dannf at debian.org>
-Build-Depends: kernel-tree-2.6.8-16sarge5, kernel-patch-2.6.8-hppa (>= 2.6.8-5), kernel-package, debianutils (>= 1.6), debhelper (>= 2), bzip2, module-init-tools, gcc-3.3-hppa64, binutils-hppa64
+Build-Depends: kernel-tree-2.6.8-16sarge6, kernel-patch-2.6.8-hppa (>= 2.6.8-5), kernel-package, debianutils (>= 1.6), debhelper (>= 2), bzip2, module-init-tools, gcc-3.3-hppa64, binutils-hppa64
 Standards-Version: 3.5.4
 
 Package: kernel-headers-2.6.8-3

Modified: dists/sarge-security/kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian/changelog
==============================================================================
--- dists/sarge-security/kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian/changelog	(original)
+++ dists/sarge-security/kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian/changelog	Tue Dec  5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-image-2.6.8-i386 (2.6.8-16sarge6) stable-security; urgency=high
+
+  * Build against kernel-tree-2.6.8-16sarge6:
+    * perfmon-fd-refcnt.dpatch
+      [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+      system call which could be used as a local denial of service attack
+      by depleting the system of file descriptors
+      See CVE-2006-3741
+    * ia64-sparc-cross-region-mappings.dpatch
+      [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+      could be used in a local DoS attack (system crash)
+      See CVE-2006-4538
+    * __block_prepare_write-recovery.dpatch
+      [SECURITY] Fix an information leak in __block_prepare_write()
+      See CVE-2006-4813
+    * atm-clip-freed-skb-deref.dpatch
+      [SECURITY] Avoid dereferencing an already freed skb, preventing a
+      potential remote DoS (system crash) vector
+      See CVE-2006-4997
+    * ip6_flowlabel-lockup.dpatch
+      [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+      sequence handling for /proc/net/ip6_flowlabel
+      See CVE-2006-5619
+    * ppc-alignment-exception-table-check.dpatch
+      [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+      futex ops
+      See CVE-2006-5649
+    * s390-uaccess-memleak.dpatch
+      [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+      remaining bytes of the kernel buffer after a fault on the userspace
+      address in copy_from_user()
+      See CVE-2006-5174
+    * smbfs-honor-mount-opts.dpatch
+      Honor uid, gid and mode mount options for smbfs even when unix extensions
+      are enabled
+      See CVE-2006-5871
+    * bridge-get_fdb_entries-overflow.dpatch
+      Protect against possible overflow in get_fdb_entries
+      See CVE-2006-5751
+
+ -- dann frazier <dannf at debian.org>  Tue,  5 Dec 2006 02:18:31 -0700
+
 kernel-image-2.6.8-i386 (2.6.8-16sarge5) stable-security; urgency=high
 
   * Build against kernel-tree-2.6.8-16sarge5:

Modified: dists/sarge-security/kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian/control
==============================================================================
--- dists/sarge-security/kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian/control	(original)
+++ dists/sarge-security/kernel/i386/kernel-image-2.6.8-i386-2.6.8/debian/control	Tue Dec  5 17:48:18 2006
@@ -4,7 +4,7 @@
 Maintainer: Debian kernel team <debian-kernel at lists.debian.org>
 Uploaders: William Lee Irwin III <wli at debian.org>, Andres Salomon <dilinger at debian.org>, Simon Horman <horms at debian.org>
 Standards-Version: 3.6.1
-Build-Depends: debhelper (>= 2), kernel-package (>= 8.054), kernel-tree-2.6.8-16sarge5, module-init-tools
+Build-Depends: debhelper (>= 2), kernel-package (>= 8.054), kernel-tree-2.6.8-16sarge6, module-init-tools
 
 Package: kernel-headers-2.6.8-3
 Architecture: i386

Modified: dists/sarge-security/kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian/changelog
==============================================================================
--- dists/sarge-security/kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian/changelog	(original)
+++ dists/sarge-security/kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian/changelog	Tue Dec  5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-image-2.6.8-ia64 (2.6.8-14sarge6) stable-security; urgency=high
+
+  * Build against kernel-tree-2.6.8-16sarge6:
+    * perfmon-fd-refcnt.dpatch
+      [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+      system call which could be used as a local denial of service attack
+      by depleting the system of file descriptors
+      See CVE-2006-3741
+    * ia64-sparc-cross-region-mappings.dpatch
+      [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+      could be used in a local DoS attack (system crash)
+      See CVE-2006-4538
+    * __block_prepare_write-recovery.dpatch
+      [SECURITY] Fix an information leak in __block_prepare_write()
+      See CVE-2006-4813
+    * atm-clip-freed-skb-deref.dpatch
+      [SECURITY] Avoid dereferencing an already freed skb, preventing a
+      potential remote DoS (system crash) vector
+      See CVE-2006-4997
+    * ip6_flowlabel-lockup.dpatch
+      [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+      sequence handling for /proc/net/ip6_flowlabel
+      See CVE-2006-5619
+    * ppc-alignment-exception-table-check.dpatch
+      [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+      futex ops
+      See CVE-2006-5649
+    * s390-uaccess-memleak.dpatch
+      [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+      remaining bytes of the kernel buffer after a fault on the userspace
+      address in copy_from_user()
+      See CVE-2006-5174
+    * smbfs-honor-mount-opts.dpatch
+      Honor uid, gid and mode mount options for smbfs even when unix extensions
+      are enabled
+      See CVE-2006-5871
+    * bridge-get_fdb_entries-overflow.dpatch
+      Protect against possible overflow in get_fdb_entries
+      See CVE-2006-5751
+
+ -- dann frazier <dannf at debian.org>  Tue,  5 Dec 2006 02:20:33 -0700
+
 kernel-image-2.6.8-ia64 (2.6.8-14sarge5) stable-security; urgency=high
 
   * Build against kernel-tree-2.6.8-16sarge5:

Modified: dists/sarge-security/kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian/control
==============================================================================
--- dists/sarge-security/kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian/control	(original)
+++ dists/sarge-security/kernel/ia64/kernel-image-2.6.8-ia64-2.6.8/debian/control	Tue Dec  5 17:48:18 2006
@@ -4,7 +4,7 @@
 Maintainer: Debian Kernel Team <debian-kernel at lists.debian.org>
 Uploaders: dann frazier <dannf at debian.org>
 Standards-Version: 3.6.1
-Build-Depends: debhelper (>= 2), kernel-package (>= 8.054), kernel-tree-2.6.8-16sarge5, module-init-tools
+Build-Depends: debhelper (>= 2), kernel-package (>= 8.054), kernel-tree-2.6.8-16sarge6, module-init-tools
 
 Package: kernel-headers-2.6.8-3
 Architecture: ia64

Modified: dists/sarge-security/kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian/changelog
==============================================================================
--- dists/sarge-security/kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian/changelog	(original)
+++ dists/sarge-security/kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian/changelog	Tue Dec  5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-image-2.6.8-m68k (2.6.8-4sarge6) stable-security; urgency=high
+
+  * Build against kernel-tree-2.6.8-16sarge6:
+    * perfmon-fd-refcnt.dpatch
+      [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+      system call which could be used as a local denial of service attack
+      by depleting the system of file descriptors
+      See CVE-2006-3741
+    * ia64-sparc-cross-region-mappings.dpatch
+      [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+      could be used in a local DoS attack (system crash)
+      See CVE-2006-4538
+    * __block_prepare_write-recovery.dpatch
+      [SECURITY] Fix an information leak in __block_prepare_write()
+      See CVE-2006-4813
+    * atm-clip-freed-skb-deref.dpatch
+      [SECURITY] Avoid dereferencing an already freed skb, preventing a
+      potential remote DoS (system crash) vector
+      See CVE-2006-4997
+    * ip6_flowlabel-lockup.dpatch
+      [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+      sequence handling for /proc/net/ip6_flowlabel
+      See CVE-2006-5619
+    * ppc-alignment-exception-table-check.dpatch
+      [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+      futex ops
+      See CVE-2006-5649
+    * s390-uaccess-memleak.dpatch
+      [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+      remaining bytes of the kernel buffer after a fault on the userspace
+      address in copy_from_user()
+      See CVE-2006-5174
+    * smbfs-honor-mount-opts.dpatch
+      Honor uid, gid and mode mount options for smbfs even when unix extensions
+      are enabled
+      See CVE-2006-5871
+    * bridge-get_fdb_entries-overflow.dpatch
+      Protect against possible overflow in get_fdb_entries
+      See CVE-2006-5751
+
+ -- dann frazier <dannf at debian.org>  Tue,  5 Dec 2006 02:20:58 -0700
+
 kernel-image-2.6.8-m68k (2.6.8-4sarge5) stable-security; urgency=high
 
   * Build against kernel-tree-2.6.8-16sarge5:

Modified: dists/sarge-security/kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian/control
==============================================================================
--- dists/sarge-security/kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian/control	(original)
+++ dists/sarge-security/kernel/m68k/kernel-image-2.6.8-m68k-2.6.8/debian/control	Tue Dec  5 17:48:18 2006
@@ -3,7 +3,7 @@
 Priority: optional
 Maintainer:  Christian T. Steigies <cts at debian.org>
 Standards-Version: 3.6.1
-Build-Depends:  kernel-tree-2.6.8-16sarge5, kernel-patch-2.6.8-m68k, kernel-package, debhelper, bzip2, console-tools
+Build-Depends:  kernel-tree-2.6.8-16sarge6, kernel-patch-2.6.8-m68k, kernel-package, debhelper, bzip2, console-tools
 
 Package: kernel-image-2.6.8-amiga
 Section: base

Modified: dists/sarge-security/kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian/changelog
==============================================================================
--- dists/sarge-security/kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian/changelog	(original)
+++ dists/sarge-security/kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian/changelog	Tue Dec  5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-patch-powerpc-2.6.8 (2.6.8-12sarge6) stable-security; urgency=high
+
+  * Build against kernel-tree-2.6.8-16sarge6:
+    * perfmon-fd-refcnt.dpatch
+      [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+      system call which could be used as a local denial of service attack
+      by depleting the system of file descriptors
+      See CVE-2006-3741
+    * ia64-sparc-cross-region-mappings.dpatch
+      [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+      could be used in a local DoS attack (system crash)
+      See CVE-2006-4538
+    * __block_prepare_write-recovery.dpatch
+      [SECURITY] Fix an information leak in __block_prepare_write()
+      See CVE-2006-4813
+    * atm-clip-freed-skb-deref.dpatch
+      [SECURITY] Avoid dereferencing an already freed skb, preventing a
+      potential remote DoS (system crash) vector
+      See CVE-2006-4997
+    * ip6_flowlabel-lockup.dpatch
+      [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+      sequence handling for /proc/net/ip6_flowlabel
+      See CVE-2006-5619
+    * ppc-alignment-exception-table-check.dpatch
+      [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+      futex ops
+      See CVE-2006-5649
+    * s390-uaccess-memleak.dpatch
+      [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+      remaining bytes of the kernel buffer after a fault on the userspace
+      address in copy_from_user()
+      See CVE-2006-5174
+    * smbfs-honor-mount-opts.dpatch
+      Honor uid, gid and mode mount options for smbfs even when unix extensions
+      are enabled
+      See CVE-2006-5871
+    * bridge-get_fdb_entries-overflow.dpatch
+      Protect against possible overflow in get_fdb_entries
+      See CVE-2006-5751
+
+ -- dann frazier <dannf at debian.org>  Tue,  5 Dec 2006 02:21:34 -0700
+
 kernel-patch-powerpc-2.6.8 (2.6.8-12sarge5) stable-security; urgency=high
 
   * Build against kernel-tree-2.6.8-16sarge5:

Modified: dists/sarge-security/kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian/rules
==============================================================================
--- dists/sarge-security/kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian/rules	(original)
+++ dists/sarge-security/kernel/powerpc/kernel-patch-powerpc-2.6.8-2.6.8/debian/rules	Tue Dec  5 17:48:18 2006
@@ -11,7 +11,7 @@
 OFFICIAL_VERSION = No
 
 # This is the kernel-tree version we build against 
-ktver = 16sarge5
+ktver = 16sarge6
 
 # set the build architecture if necessary
 DEB_HOST_ARCH ?= $(shell dpkg --print-architecture)

Modified: dists/sarge-security/kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian/changelog
==============================================================================
--- dists/sarge-security/kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian/changelog	(original)
+++ dists/sarge-security/kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian/changelog	Tue Dec  5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-image-2.6.8-s390 (2.6.8-5sarge6) stable-security; urgency=high
+
+  * Build against kernel-tree-2.6.8-16sarge6:
+    * perfmon-fd-refcnt.dpatch
+      [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+      system call which could be used as a local denial of service attack
+      by depleting the system of file descriptors
+      See CVE-2006-3741
+    * ia64-sparc-cross-region-mappings.dpatch
+      [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+      could be used in a local DoS attack (system crash)
+      See CVE-2006-4538
+    * __block_prepare_write-recovery.dpatch
+      [SECURITY] Fix an information leak in __block_prepare_write()
+      See CVE-2006-4813
+    * atm-clip-freed-skb-deref.dpatch
+      [SECURITY] Avoid dereferencing an already freed skb, preventing a
+      potential remote DoS (system crash) vector
+      See CVE-2006-4997
+    * ip6_flowlabel-lockup.dpatch
+      [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+      sequence handling for /proc/net/ip6_flowlabel
+      See CVE-2006-5619
+    * ppc-alignment-exception-table-check.dpatch
+      [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+      futex ops
+      See CVE-2006-5649
+    * s390-uaccess-memleak.dpatch
+      [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+      remaining bytes of the kernel buffer after a fault on the userspace
+      address in copy_from_user()
+      See CVE-2006-5174
+    * smbfs-honor-mount-opts.dpatch
+      Honor uid, gid and mode mount options for smbfs even when unix extensions
+      are enabled
+      See CVE-2006-5871
+    * bridge-get_fdb_entries-overflow.dpatch
+      Protect against possible overflow in get_fdb_entries
+      See CVE-2006-5751
+
+ -- dann frazier <dannf at debian.org>  Tue,  5 Dec 2006 02:21:43 -0700
+
 kernel-image-2.6.8-s390 (2.6.8-5sarge5) stable-security; urgency=high
 
   * Build against kernel-tree-2.6.8-16sarge5:

Modified: dists/sarge-security/kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian/control
==============================================================================
--- dists/sarge-security/kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian/control	(original)
+++ dists/sarge-security/kernel/s390/kernel-image-2.6.8-s390-2.6.8/debian/control	Tue Dec  5 17:48:18 2006
@@ -4,7 +4,7 @@
 Maintainer: Debian kernel team <debian-kernel at lists.debian.org>
 Uploaders: Bastian Blank <waldi at debian.org>, Jochen Röhrig <jr at debian.org>
 Standards-Version: 3.5.6
-Build-Depends: debhelper (>> 4.0.0), module-init-tools, kernel-tree-2.6.8-16sarge5, kernel-package (>= 8.084), dh-kpatches
+Build-Depends: debhelper (>> 4.0.0), module-init-tools, kernel-tree-2.6.8-16sarge6, kernel-package (>= 8.084), dh-kpatches
 
 Package: kernel-patch-2.6.8-s390
 Architecture: all

Modified: dists/sarge-security/kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian/changelog
==============================================================================
--- dists/sarge-security/kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian/changelog	(original)
+++ dists/sarge-security/kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian/changelog	Tue Dec  5 17:48:18 2006
@@ -1,3 +1,45 @@
+kernel-image-2.6.8-sparc (2.6.8-15sarge6) stable-security; urgency=high
+
+  * Build against kernel-tree-2.6.8-16sarge6:
+    * perfmon-fd-refcnt.dpatch
+      [SECURITY][ia64] Fix file descriptor leak in perfmonctl
+      system call which could be used as a local denial of service attack
+      by depleting the system of file descriptors
+      See CVE-2006-3741
+    * ia64-sparc-cross-region-mappings.dpatch
+      [SECURITY] Prevent cross-region mappings on ia64 and sparc which
+      could be used in a local DoS attack (system crash)
+      See CVE-2006-4538
+    * __block_prepare_write-recovery.dpatch
+      [SECURITY] Fix an information leak in __block_prepare_write()
+      See CVE-2006-4813
+    * atm-clip-freed-skb-deref.dpatch
+      [SECURITY] Avoid dereferencing an already freed skb, preventing a
+      potential remote DoS (system crash) vector
+      See CVE-2006-4997
+    * ip6_flowlabel-lockup.dpatch
+      [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
+      sequence handling for /proc/net/ip6_flowlabel
+      See CVE-2006-5619
+    * ppc-alignment-exception-table-check.dpatch
+      [SECURITY][ppc] Avoid potential DoS which can be triggered by some
+      futex ops
+      See CVE-2006-5649
+    * s390-uaccess-memleak.dpatch
+      [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
+      remaining bytes of the kernel buffer after a fault on the userspace
+      address in copy_from_user()
+      See CVE-2006-5174
+    * smbfs-honor-mount-opts.dpatch
+      Honor uid, gid and mode mount options for smbfs even when unix extensions
+      are enabled
+      See CVE-2006-5871
+    * bridge-get_fdb_entries-overflow.dpatch
+      Protect against possible overflow in get_fdb_entries
+      See CVE-2006-5751
+
+ -- dann frazier <dannf at debian.org>  Tue,  5 Dec 2006 02:21:54 -0700
+
 kernel-image-2.6.8-sparc (2.6.8-15sarge5) stable-security; urgency=high
 
   * Build against kernel-tree-2.6.8-16sarge5:

Modified: dists/sarge-security/kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian/control
==============================================================================
--- dists/sarge-security/kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian/control	(original)
+++ dists/sarge-security/kernel/sparc/kernel-image-2.6.8-sparc-2.6.8/debian/control	Tue Dec  5 17:48:18 2006
@@ -4,7 +4,7 @@
 Maintainer: Debian Kernel Team <debian-kernel at lists.debian.org>
 Uploaders: Joshua Kwan <joshk at triplehelix.org>, Ben Collins <bcollins at debian.org>, Andres Salomon <dilinger at debian.org>, dann frazier <dannf at debian.org>
 Standards-Version: 3.6.1.0
-Build-Depends: gcc (>= 4:3.3), kernel-tree-2.6.8-16sarge5, debhelper (>= 4), kernel-package, sparc-utils, module-init-tools
+Build-Depends: gcc (>= 4:3.3), kernel-tree-2.6.8-16sarge6, debhelper (>= 4), kernel-package, sparc-utils, module-init-tools
 
 Package: kernel-build-2.6.8-3
 Architecture: sparc



More information about the Kernel-svn-changes mailing list