[kernel] r6773 - dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian

Dann Frazier dannf at costa.debian.org
Fri Jun 2 05:17:21 UTC 2006


Author: dannf
Date: Fri Jun  2 05:17:18 2006
New Revision: 6773

Modified:
   dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/changelog
   dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/control

Log:
* Build against kernel-tree-2.4.27-10sarge3:
  * 207_smbfs-chroot-escape.diff
    [SECURITY] Fix directory traversal vulnerability in smbfs that permits
    local users to escape chroot restrictions
    See CVE-2006-1864
  * 208_ia64-die_if_kernel-returns.diff
    [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by
    an incorrect 'noreturn' attribute on die_if_kernel()
    See CVE-2006-0742
  * 209_sctp-discard-unexpected-in-closed.diff
    [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks
    received in CLOSED state instead of calling BUG()
    See CVE-2006-2271
  * 210_ipv4-id-no-increment.diff
    [SECURITY] Fix vulnerability that allows remote attackers to conduct an
    Idle Scan attack, bypassing intended protections against such attacks
    See CVE-2006-1242
  * 211_usb-gadget-rndis-bufoverflow.diff
    [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation
    that allows for a remote DoS attack (kmalloc'd memory corruption)
    See CVE-2006-1368
  * 212_ipv4-sin_zero_clear.diff
    [SECURITY] Fix local information leak in af_inet code
    See CVE-2006-1343
  * 213_madvise_remove-restrict.diff
    [SECURITY] Fix vulnerability that allows local users to bypass IPC
    permissions and replace portions of read-only tmpfs files with zeroes.
    See CVE-2006-1524
  * 214_mcast-ip-route-null-deref.diff
    [SECURITY] Fix local DoS vulnerability that allows local users to panic
    a system by requesting a route for a multicast IP
    See CVE-2006-1525
  * 215_sctp-fragment-recurse.diff
    [SECURITY] Fix remote DoS vulnerability that can lead to infinite
    recursion when a packet containing two or more DATA fragments is received
    See CVE-2006-2274
  * 216_sctp-fragmented-receive-fix.diff
    [SECURITY] Fix remote DoS vulnerability that allows IP fragmented
    COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic
    See CVE-2006-2272
  * 217_amd64-fp-reg-leak.diff
    [SECURITY][amd64] Fix an information leak that allows a process to see
    a portion of the floating point state of other processes, possibly
    exposing sensitive information.
    See CVE-2006-1056
  * 218_do_add_counters-race.diff
    [SECURITY] Fix race condition in the do_add_counters() function in
    netfilter that allows local users with CAP_NET_ADMIN capabilities to
    read kernel memory
    See CVE-2006-0039
  * 219_sctp-hb-ack-overflow.diff
    [SECURITY] Fix a remote buffer overflow that can result from a badly
    formatted HB-ACK chunk
    See CVE-2006-1857
  * 220_sctp-param-bound-checks.diff
    [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter
    checking code
    See CVE-2006-1858
  * 221_netfilter-do_replace-overflow.diff
    [SECURITY] Fix buffer overflow in netfilter do_replace which can could
    be triggered by users with CAP_NET_ADMIN rights.
    See CVE-2006-0038
  * 222_binfmt-bad-elf-entry-address.diff
    [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf
    code on em64t processors
    See CVE-2006-0741

Modified: dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/changelog
==============================================================================
--- dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/changelog	(original)
+++ dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/changelog	Fri Jun  2 05:17:18 2006
@@ -1,3 +1,74 @@
+kernel-image-2.4.27-sparc (2.4.27-9sarge3) stable-security; urgency=high
+
+  * Build against kernel-tree-2.4.27-10sarge3:
+    * 207_smbfs-chroot-escape.diff
+      [SECURITY] Fix directory traversal vulnerability in smbfs that permits
+      local users to escape chroot restrictions
+      See CVE-2006-1864
+    * 208_ia64-die_if_kernel-returns.diff
+      [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by
+      an incorrect 'noreturn' attribute on die_if_kernel()
+      See CVE-2006-0742
+    * 209_sctp-discard-unexpected-in-closed.diff
+      [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks
+      received in CLOSED state instead of calling BUG()
+      See CVE-2006-2271
+    * 210_ipv4-id-no-increment.diff
+      [SECURITY] Fix vulnerability that allows remote attackers to conduct an
+      Idle Scan attack, bypassing intended protections against such attacks
+      See CVE-2006-1242
+    * 211_usb-gadget-rndis-bufoverflow.diff
+      [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation
+      that allows for a remote DoS attack (kmalloc'd memory corruption)
+      See CVE-2006-1368
+    * 212_ipv4-sin_zero_clear.diff
+      [SECURITY] Fix local information leak in af_inet code
+      See CVE-2006-1343
+    * 213_madvise_remove-restrict.diff
+      [SECURITY] Fix vulnerability that allows local users to bypass IPC
+      permissions and replace portions of read-only tmpfs files with zeroes.
+      See CVE-2006-1524
+    * 214_mcast-ip-route-null-deref.diff
+      [SECURITY] Fix local DoS vulnerability that allows local users to panic
+      a system by requesting a route for a multicast IP
+      See CVE-2006-1525
+    * 215_sctp-fragment-recurse.diff
+      [SECURITY] Fix remote DoS vulnerability that can lead to infinite
+      recursion when a packet containing two or more DATA fragments is received
+      See CVE-2006-2274
+    * 216_sctp-fragmented-receive-fix.diff
+      [SECURITY] Fix remote DoS vulnerability that allows IP fragmented
+      COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic
+      See CVE-2006-2272
+    * 217_amd64-fp-reg-leak.diff
+      [SECURITY][amd64] Fix an information leak that allows a process to see
+      a portion of the floating point state of other processes, possibly
+      exposing sensitive information.
+      See CVE-2006-1056
+    * 218_do_add_counters-race.diff
+      [SECURITY] Fix race condition in the do_add_counters() function in
+      netfilter that allows local users with CAP_NET_ADMIN capabilities to
+      read kernel memory
+      See CVE-2006-0039
+    * 219_sctp-hb-ack-overflow.diff
+      [SECURITY] Fix a remote buffer overflow that can result from a badly
+      formatted HB-ACK chunk
+      See CVE-2006-1857
+    * 220_sctp-param-bound-checks.diff
+      [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter
+      checking code
+      See CVE-2006-1858
+    * 221_netfilter-do_replace-overflow.diff
+      [SECURITY] Fix buffer overflow in netfilter do_replace which can could
+      be triggered by users with CAP_NET_ADMIN rights.
+      See CVE-2006-0038
+    * 222_binfmt-bad-elf-entry-address.diff
+      [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf
+      code on em64t processors
+      See CVE-2006-0741
+
+ -- dann frazier <dannf at debian.org>  Thu,  1 Jun 2006 23:16:20 -0600
+
 kernel-image-2.4.27-sparc (2.4.27-9sarge2) stable-security; urgency=high
 
   * Build against 2.4.27-10sarge2

Modified: dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/control
==============================================================================
--- dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/control	(original)
+++ dists/sarge-security/kernel-2.4/sparc/kernel-image-2.4.27-sparc-2.4.27/debian/control	Fri Jun  2 05:17:18 2006
@@ -4,7 +4,7 @@
 Maintainer: Debian Kernel Team <debian-kernel at lists.debian.org>
 Uploaders: Rob Radez <rob at osinvestor.com>, Joshua Kwan <joshk at triplehelix.org>, Andres Salomon <dilinger at debian.org>
 Standards-Version: 3.6.1.0
-Build-Depends: gcc (>= 4:3.3), kernel-tree-2.4.27-10sarge2, debhelper (>= 4), kernel-package, sparc-utils, modutils
+Build-Depends: gcc (>= 4:3.3), kernel-tree-2.4.27-10sarge3, debhelper (>= 4), kernel-package, sparc-utils, modutils
 
 Package: kernel-build-2.4.27-3
 Architecture: sparc



More information about the Kernel-svn-changes mailing list