kernel-image-2.6.8-s390_2.6.8-5sarge5_s390.changes is NEW
kernel-image-2.6.8-s390_2.6.8-5sarge5.dsc
to pool/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge5.dsc
kernel-image-2.6.8-s390_2.6.8-5sarge5.tar.gz
to pool/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge5.tar.gz
(new) kernel-patch-2.6.8-s390_2.6.8-5sarge5_all.deb optional devel
Diffs to the Linux kernel source 2.6.8 for IBM S/390 and zSeries
Patches for the Linux kernel for the S/390 and zSeries architecture.
This package includes the patch for the Linux kernel version 2.6.8.
Changes: kernel-image-2.6.8-s390 (2.6.8-5sarge5) stable-security; urgency=high
.
* Build against kernel-tree-2.6.8-16sarge5:
* [ERRATA] madvise_remove-restrict.dpatch
[SECURITY] The 2.6.8-16sarge3 changelog associated this patch with
CVE-2006-1524. However, this patch fixes an mprotect issue that was
split off from the original report into CVE-2006-2071. 2.6.8 is not
vulnerable to CVE-2006-1524 the madvise_remove issue.
See CVE-2006-2071
* fs-ext3-bad-nfs-handle.dpatch
[SECURITY] James McKenzie discovered a Denial of Service vulnerability
in the NFS driver. When exporting an ext3 file system over NFS, a remote
attacker could exploit this to trigger a file system panic by sending
a specially crafted UDP packet.
See CVE-2006-3468
* direct-io-write-mem-leak.dpatch
[SECURITY] Fix memory leak in O_DIRECT write.
See CVE-2004-2660
* nfs-handle-long-symlinks.dpatch
[SECURITY] Fix buffer overflow in NFS readline handling that allows a
remote server to cause a denial of service (crash) via a long symlink
See CVE-2005-4798
* cdrom-bad-cgc.buflen-assign.dpatch
[SECURITY] Fix buffer overflow in dvd_read_bca which could potentially
be used by a local user to trigger a buffer overflow via a specially
crafted DVD, USB stick, or similar automatically mounted device.
See CVE-2006-2935
* usb-serial-ftdi_sio-dos.patch
[SECURITY] fix userspace DoS in ftdi_sio driver
See CVE-2006-2936
* selinux-tracer-SID-fix.dpatch
[SECURITY] Fix vulnerability in selinux_ptrace that prevents local
users from changing the tracer SID to the SID of another process
See CVE-2006-1052
* netfilter-SO_ORIGINAL_DST-leak.dpatch
[SECURITY] Fix information leak in SO_ORIGINAL_DST
See CVE-2006-1343
* sg-no-mmap-VM_IO.dpatch
[SECURITY] Fix DoS vulnerability whereby a local user could attempt
a dio/mmap and cause the sg driver to oops.
See CVE-2006-1528
* exit-bogus-bugon.dpatch
[SECURITY] Remove bogus BUG() in exit.c which could be maliciously
triggered by a local user
See CVE-2006-1855
* readv-writev-missing-lsm-check.dpatch,
readv-writev-missing-lsm-check-compat.dpatch
[SECURITY] Add missing file_permission callback in readv/writev syscalls
See CVE-2006-1856
* snmp-nat-mem-corruption-fix.dpatch
[SECURITY] Fix memory corruption in snmp_trap_decode
See CVE-2006-2444
* kfree_skb-race.dpatch
[SECURITY] Fix race between kfree_skb and __skb_unlink
See CVE-2006-2446
* hppa-mb-extraneous-semicolon.dpatch,
sparc32-mb-extraneous-semicolons.dpatch,
sparc64-mb-extraneous-semicolons.dpatch:
Fix a syntax error caused by extranous semicolons in smp_mb() macros
which resulted in a build failure with kfree_skb-race.dpatch
* sctp-priv-elevation.dpatch
[SECURITY] Fix SCTP privelege escalation
See CVE-2006-3745
* sctp-priv-elevation-2.dpatch
[SECURITY] Fix local DoS resulting from sctp-priv-elevation.dpatch
See CVE-2006-4535
* ppc-hid0-dos.dpatch
[SECURITY][ppc] Fix local DoS by clearing HID0 attention enable on
PPC970 at boot time
See CVE-2006-4093
* udf-deadlock.dpatch
[SECURITY] Fix possible UDF deadlock and memory corruption
See CVE-2006-4145
Override entries for your package:
kernel-image-2.6.8-s390_2.6.8-5sarge5.dsc - source devel
Announcing to debian-changes@lists.debian.org
Your package contains new components which requires manual editing of
the override file. It is ok otherwise, so please be patient. New
packages are usually added to the override file about once a week.
You may have gotten the distribution wrong. You'll get warnings above
if files already exist in other distributions.
Reply to: