[kernel] r5219 - in dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian: . patches/series

Dann Frazier dannf at costa.debian.org
Wed Jan 4 06:41:30 UTC 2006


Author: dannf
Date: Wed Jan  4 06:41:26 2006
New Revision: 5219

Modified:
   dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog
   dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/patches/series/2.6.8-16sarge2
Log:
* sysctl-unregistration-oops.dpatch
  [SECURITY] Fix a potential local root exploit in the
  /proc/sys/net/ipv4/conf interface.  See CVE-2005-2709
  ****CHANGES ABI****
* ipv4-fragment-queues-2.1.dpatch, ipv4-fragment-queues-3.dpatch,
  ipv4-fragment-queues-4.dpatch:
  [SECURITY] Re-apply the -3 and -4 patches, which were dropped in 2.6.8-15
  to avoid an ABI change.  Unapply the -2.1 patch which is superseded by -3.
  See CVE-2005-0449
  ****CHANGES ABI****

Modified: dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog
==============================================================================
--- dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog	(original)
+++ dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog	Wed Jan  4 06:41:26 2006
@@ -101,17 +101,24 @@
   * net-ipv6-udp_v6_get_port-loop.dpatch
     [SECURITY] Fix infinite loop in udp_v6_get_port().  See CVE-2005-2973
 
-  # DISABLED DUE TO ABI CHANGE
-  # * sysctl-unregistration-oops.dpatch
-  #   [SECURITY] Fix a potential local root exploit in the
-  #   /proc/sys/net/ipv4/conf interface.  See CVE-2005-2709
+  * sysctl-unregistration-oops.dpatch
+    [SECURITY] Fix a potential local root exploit in the
+    /proc/sys/net/ipv4/conf interface.  See CVE-2005-2709
+    ****CHANGES ABI****
 
   * setkeys-needs-root-1.dpatch, setkeys-needs-root-2.dpatch:
     [SECURITY] Require root privilege to write the current
     function key string entry of other user's terminals.
     See CVE-2005-3257
 
- -- Simon Horman <horms at verge.net.au>  Tue, 20 Dec 2005 11:42:14 +0900
+  * ipv4-fragment-queues-2.1.dpatch, ipv4-fragment-queues-3.dpatch,
+    ipv4-fragment-queues-4.dpatch:
+    [SECURITY] Re-apply the -3 and -4 patches, which were dropped in 2.6.8-15
+    to avoid an ABI change.  Unapply the -2.1 patch which is superseded by -3.
+    See CVE-2005-0449
+    ****CHANGES ABI****
+
+ -- dann frazier <dannf at debian.org>  Tue,  3 Jan 2006 23:36:41 -0700
 
 kernel-source-2.6.8 (2.6.8-16sarge1) stable-security; urgency=high
 

Modified: dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/patches/series/2.6.8-16sarge2
==============================================================================
--- dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/patches/series/2.6.8-16sarge2	(original)
+++ dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/patches/series/2.6.8-16sarge2	Wed Jan  4 06:41:26 2006
@@ -12,7 +12,10 @@
 + orinoco-info-leak.dpatch
 + plug-names_cache-memleak.dpatch
 + net-ipv6-udp_v6_get_port-loop.dpatch
-# ABI CHANGE sysctl-unregistration-oops.dpatch
++ sysctl-unregistration-oops.dpatch
 + setkeys-needs-root-1.dpatch
 + setkeys-needs-root-2.dpatch
 + fs-lock-lease-log-spam.dpatch
+- ipv4-fragment-queues-2.1.dpatch
++ ipv4-fragment-queues-3.dpatch
++ ipv4-fragment-queues-4.dpatch



More information about the Kernel-svn-changes mailing list