[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

2.6 upgrade left machine unbootable



I've been running the Debian 2.6.8-3-686-smp kernel image happily for a
while. However today I did a update/upgrade which involved updating the
image (attachment has details from apt-listchanges) and, as told during
installation of these, I rebooted as soon as apt-get had completed.
However I can no longer boot my machine. The error I get is:

pivot_root: no such file or directory
/sbin/init:432: cannot open dev/console: No such file

I also note that during boot up the SATA disks now seem to be labelled hda
(etc) - they used to be sda (etc). Despite changing that on the GRUB boot
line I still cannot log in. I do (or did?!) have a nVidia module but I
presume that is not the issue since the boot doesn't get far enough to
load X etc.

Can anybody advise on how to fix this? Thanks, Michael
apache2 (2.0.54-5sarge1) stable-security; urgency=high

  * Non-maintainer upload by The Security Team.
  * Added 047_rewrite_off_by_one_CVE-2006-3747, fixing an off-by-one
    error in mod_rewrite.  [CVE-2006-3747]

 -- Steve Kemp <skx@debian.org>  Fri,  28 Jul 2006 09:50:36 +0000

gimp (2.2.6-1sarge1) stable-security; urgency=high

  * Non-maintainer upload by the Security Team:
    Fix buffer overflow in XCF parser, discovered by Henning Makholm.
    [CVE-2006-3404]

 -- Moritz Muehlenhoff <jmm@debian.org>  Thu, 13 Jul 2006 21:31:08 +0200

kernel-image-2.6.8-i386 (2.6.8-16sarge4) stable-security; urgency=high

  * Build against kernel-tree-2.6.8-16sarge4:
    * proc-environ-race-1.dpatch, proc-environ-race-2.dpatch
      [SECURITY] Fix local root vulnerability caused by a race in proc
      See CVE-2006-3626

 -- dann frazier <dannf@debian.org>  Sat, 15 Jul 2006 02:23:36 -0600

kernel-image-2.6.8-i386 (2.6.8-16sarge3) stable-security; urgency=high

  * Build against kernel-tree-2.6.8-16sarge3:
    * net-protocol-mod-refcounts-pre.dpatch, net-protocol-mod-refcounts.dpatch
      [SECURITY] Fix potential DoS (panic) cause by inconsistent reference
      counting in network protocol modules.
      See CVE-2005-3359
    * netfilter-do_replace-overflow.dpatch
      [SECURITY] Fix buffer overflow in netfilter do_replace which can could
      be triggered by users with CAP_NET_ADMIN rights.
      See CVE-2006-0038
    * sys_mbind-sanity-checking.dpatch
      [SECURITY] Make sure maxnodes is safe size before calculating nlongs in
      get_nodes() to prevent a local DoS vulnerability.
      See CVE-2006-0557
    * smbfs-chroot-escape.dpatch
      [SECURITY] Fix directory traversal vulnerability in smbfs that permits
      local users to escape chroot restrictions
      See CVE-2006-1864
    * perfmon-exit-race.dpatch
      [SECURITY][ia64] Fix local denial of service vulnerability (oops) in
      the ia64 perfmon subsystem
      See CVE-2006-0558
    * ia64-die_if_kernel-returns.dpatch
      [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by
      an incorrect 'noreturn' attribute on die_if_kernel()
      See CVE-2006-0742
    * smbfs-chroot-escape.dpatch
      [SECURITY] Fix directory traversal vulnerability in smbfs that permits
      local users to escape chroot restrictions
      See CVE-2006-1863
    * binfmt-bad-elf-entry-address.dpatch
      [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf
      code on em64t processors
      See CVE-2006-0741
    * em64t-uncanonical-return-addr.dpatch
      [SECURITY][amd64] Fix local DoS vulnerability on em64t systems that
      arises when returning program control using SYSRET
      See CVE-2006-0744
    * sctp-discard-unexpected-in-closed.dpatch
      [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks
      received in CLOSED state instead of calling BUG()
      See CVE-2006-2271
    * ipv4-id-no-increment.dpatch
      [SECURITY] Fix vulnerability that allows remote attackers to conduct an
      Idle Scan attack, bypassing intended protections against such attacks
      See CVE-2006-1242
    * usb-gadget-rndis-bufoverflow.dpatch
      [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that
      allows for a remote DoS attack (kmalloc'd memory corruption)
      See CVE-2006-1368
    * group_complete_signal-BUG_ON.dpatch
      [SECURITY] Fix improper use of BUG_ON in __group_complete_signal()
      See CVE-2006-1523
    * madvise_remove-restrict.dpatch
      [SECURITY] Fix vulnerability that allows local users to bypass IPC
      permissions and replace portions of read-only tmpfs files with zeroes.
      See CVE-2006-1524
    * mcast-ip-route-null-deref.dpatch
      [SECURITY] Fix local DoS vulnerability that allows local users to panic
      a system by requesting a route for a multicast IP
      See CVE-2006-1525
    * sctp-fragment-recurse.dpatch
      [SECURITY] Fix remote DoS vulnerability that can lead to infinite
      recursion when a packet containing two or more DATA fragments is received
      See CVE-2006-2274
    * sctp-fragmented-receive-fix.dpatch
      [SECURITY] Fix remote DoS vulnerability that allows IP fragmented
      COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic
      See CVE-2006-2272
    * amd64-fp-reg-leak-dep[1-3].dpatch, amd64-fp-reg-leak.dpatch
      [SECURITY][amd64] Fix an information leak that allows a process to see
      a portion of the floating point state of other processes, possibly
      exposing sensitive information.
      See CVE-2006-1056
    * do_add_counters-race.dpatch
      [SECURITY] Fix race condition in the do_add_counters() function in
      netfilter that allows local users with CAP_NET_ADMIN capabilities to
      read kernel memory
      See CVE-2006-0039
    * s390-strnlen_user-return.dpatch
      [SECURITY][s390] Fix local DoS on s390 that may result from strnlen_user
      returning a value that is too large
      See CVE-2006-0456
    * xfs-ftruncate-leak.dpatch
      [SECURITY] Fix leak in the ftruncate call in the XFS filesystem that may
      permit local users to view sensitive information
      See CVE-2006-0554
    * nfs-another-O_DIRECT-fix.dpatch
      [SECURITY] Fix a potential local DoS vulnerability in the NFS O_DIRECT
      code
      See CVE-2006-0555
    * sctp-hb-ack-overflow.dpatch
      [SECURITY] Fix a remote buffer overflow that can result from a badly
      formatted HB-ACK chunk
      See CVE-2006-1857
    * sctp-param-bound-checks.dpatch
      [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter
      checking code
      See CVE-2006-1858

 -- dann frazier <dannf@debian.org>  Sat, 20 May 2006 04:05:23 -0500

kernel-image-2.6.8-i386 (2.6.8-16sarge2) stable-security; urgency=high

  * Build against kernel-tree-2.6.8-16sarge2
  * Increment ABI to -3

 -- dann frazier <dannf@debian.org>  Wed,  1 Feb 2006 00:03:47 -0700

libtunepimp (0.3.0-3sarge2) stable-security; urgency=high

  * Non-maintainer upload by the Security Team
  * Applied missing bit of the patch by Kevin Kofler to fix buffer
    overflows [lib/lookuptools.cpp, CVE-2006-3600]
  * Applied patch by Robert Jordens

 -- Martin Schulze <joey@infodrom.org>  Mon, 24 Jul 2006 08:28:58 +0200

libtunepimp (0.3.0-3sarge1) stable-security; urgency=high

  * Non-maintainer upload by the Security Team
  * Applied patch by Kevin Kofler to fix buffer overflows
    [lib/lookuptools.cpp, CVE-2006-3600]

 -- Martin Schulze <joey@infodrom.org>  Sun, 23 Jul 2006 20:23:48 +0200

openoffice.org (1.1.3-9sarge3) stable-security; urgency=high

  * ooo-build/patches/OOO_1_1/sax-xml-2-utf8-converter-extra-1.1.x.diff:
    add addiitional patch for the file format patch needed for OOo < 1.1.5

 -- Rene Engelhard <rene@debian.org>  Fri, 30 Jun 2006 10:04:57 +0000

openoffice.org (1.1.3-9sarge2) stable-security; urgency=high

  * ooo-build/patches/OOO_1_1/sax+source+expatwrap+xml2utf.cxx.diff:
    security patch again (from upstream); fix memory corruption bug;
    it was possible to write values to arbritrary memory when
    opening special files. (CVE-2006-3117)

 -- Rene Engelhard <rene@debian.org>  Thu, 22 Jun 2006 18:17:46 +0000

openoffice.org (1.1.3-9sarge1) stable-security; urgency=high

  * ooo-build/patches/OOO_1_1/6438334-macros-so7-sfx2.diff: add patch
    from upstream to fix macro handling security bug; it was possible to
    embed macros in documents without OOo seeing them and executing them
    without any user interaction. (CVE-2006-2198)
  * ooo-build/patches/OOO_1_1/6438333-applets-so7-officecfg.diff: add patch
    from upstream to disable Java applets feature because it's possible
    to write Java applets breaking out of the sandbox (NB: the normal
    packages don't build with Java so are not affected, but the
    openoffice.org-java addon package is) (CVE-2006-2199)
  * debian/scripts/vars.i386: disable mozab on i386, too; uses mozilla
    *1.0* code and is a security nightmare. Already done pre-sarge for ppc,
    s390 and sparc but forgotten for i386 :/
  * debian/MANIFEST.i386: update

 -- Rene Engelhard <rene@debian.org>  Fri, 16 Jun 2006 09:43:32 +0000

samba (3.0.14a-3sarge2) stable-security; urgency=high

  * Non-maintainer upload by the Security Team:
    Fix anonymous memory exhaustion DoS. [CVE-2006-3403]

 -- Moritz Muehlenhoff <jmm@debian.org>  Thu, 13 Jul 2006 20:44:12 +0200

ppp (2.4.3-20050321+2sarge1) stable-security; urgency=medium

  * Non-maintainer upload by the Security Team
  * Applied patch by Marcus Meissner to honor the return value of a
    potentially failing setuid() call [pppd/plugins/winbind.c,
    debian/patches/zzz-CVE-2006-2194]

 -- Martin Schulze <joey@infodrom.org>  Sat,  3 Jun 2006 20:31:13 +0200

Reply to: