-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Tue, 31 Jan 2006 22:45:22 -0700 Source: kernel-source-2.6.8 Binary: kernel-source-2.6.8 kernel-doc-2.6.8 kernel-tree-2.6.8 kernel-patch-debian-2.6.8 Architecture: source all Version: 2.6.8-16sarge2 Distribution: stable-security Urgency: high Maintainer: Debian kernel team <debian-kernel@lists.debian.org> Changed-By: dann frazier <dannf@debian.org> Description: kernel-doc-2.6.8 - Linux kernel specific documentation for version 2.6.8 kernel-patch-debian-2.6.8 - Debian patches to Linux 2.6.8 kernel-source-2.6.8 - Linux kernel source for version 2.6.8 with Debian patches kernel-tree-2.6.8 - Linux kernel source tree for building Debian kernel images Changes: kernel-source-2.6.8 (2.6.8-16sarge2) stable-security; urgency=high . [ Simon Horman ] * net-sockglue-cap.dpatch [SECURITY] Restrict socket policy loading to CAP_NET_ADMIN. See CAN-2005-2555. . * zisofs.diff [SECURITY] Check input buffer size in zisofs From 2.6.12.5 Omitted from the previous release, as I wasn't sure that it was a security bug. But now it has a CAN number, so its in. See CAN-2005-2457 . * zlib-revert-broken-change.dpatch [SECURITY] Revert huft_build() function fix From 2.6.12.6 See CAN-2005-2459 . * fs_ext2_ext3_xattr-sharing.dpatch Included in 2.6.8-16sarge1 is CAN-2005-2801 . * net-ipv4-netfilter-ip_recent-last_pkts.dpatch Included in 2.6.8-16sarge1 is CAN-2005-2872 . * net-bridge-forwarding-poison-1.dpatch, net-bridge-forwarding-poison-2.dpatch: The previous changelog incorretly lists net-bridge-forwarding-poison-2.dpatch twice for the same fix, this should be net-bridge-forwarding-poison-1.dpatch and net-bridge-forwarding-poison-2.dpatch . * fix-dst-leak-in-icmp_push_reply.dpatch [SECURITY] Fix DST leak in icmp_push_reply(). Remote DoS. See CVE-2005-3848 From 2.6.12.6 . * nptl-signal-delivery-deadlock-fix.dpatch [SECURITY] NPTL signal delivery deadlock fix. See CVE-2005-3847 Backported From 2.6.12.6 . * fix-memory-leak-in-sg.c-seq_file.dpatch [SECURITY] fix a memory leak in devices seq_file implementation; local DoS. From 2.6.12.6 See CAN-2005-2800 . * ipv6-skb-leak.dpatch [SECURITY] Fix SKB leak in ip6_input_finish(); local DoS. See CVE-2005-3858 From 2.6.12.6 . * sendmsg-stackoverflow.dpatch [SECUURITY] 32bit sendmsg() flaw. See CAN-2005-2490 From 2.6.13.1 . * lost-fput-in-32bit-ioctl-on-x86-64.dpatch [SECURITY] lost fput in 32bit ioctl on x86-6; local DoS From 2.6.13.2 See CAN-2005-3044 . * lost-sockfd_put-in-32bit-compat-routing_ioctl.dpatch [SECURITY] lost sockfd_put() in routing_ioctl(); local DoS From 2.6.13.2 . * net-bridge-netfilter-etables-smp-race.dpatch in 2.6.8-16sarge1 is CAN-2005-3110 . * fs-hfs-oops-and-leak.dpatch in 2.6.8-16sarge1 is CAN-2005-3109 . * arch-x86_64-mm-ioremap-page-lookup.dpatch in 2.6.8-16sarge1 is CAN-2005-3108 . * fs-exec-ptrace-core-exec-race.dpatch in 2.6.8-16sarge1 is CAN-2005-3106 . * fs-exec-ptrace-deadlock.dpatch in 2.6.8-16sarge1 is CAN-2005-3107 . * mckinley_icache.dpatch in 2.6.8-16sarge1 is CAN-2005-3105 . * orinoco-info-leak.dpatch [SECURITY] orinoco: Information leakage due to incorrect padding See CAN-2005-3180 From 2.6.13.4 . * plug-names_cache-memleak.dpatch [SECURITY] Avoid 'names_cache' memory leak with CONFIG_AUDITSYSCALL See CVE-2005-3181 . * fs-lock-lease-log-spam.dpatch [SECURITY] VFS: local denial-of-service with file leases. See CVE-2005-3857 Will be in 2.6.15 . * mempolicy-undefined-nodes.dpatch [SECURITY] Make sure interleave masks have at least one node set; Local Dos See CVE-2005-3358 From 2.6.15 . * proc-legacy-loff-underflow.dpatch [SECURITY] Fix underflow in legacy proc interface; Local information leak See CVE-2005-4605 From 2.6.15 . * dm-crypt-zero-key.dpatch [SECURITY] drm-crypt: zero key berofe freeing it. Potential local information leak See CVE-2006-0095 . * net-ipv6-flowlabel-refcnt.dpatch [SECURITY] Fix refcnt of struct ip6_flowlabel; Local DoS From 2.6.14 See CVE-2005-3806 . * kernel-dont-reap-traced.dpatch [SECURITY] Don't auto-reap traced children; Local DoS See CVE-2005-3784 . * net-sdla-coverty.dpatch [SECURITY] SDLA firmware upgrade should require CAP_SYS_RAWIO; Local DoS CVE-2006-0096 . [ dann frazier ] * mempolicy-check-mode.dpatch [SECURITY] Input validation in sys_set_mempolicy(); local DoS. See CAN-2005-3053 . * net-ipv6-udp_v6_get_port-loop.dpatch [SECURITY] Fix infinite loop in udp_v6_get_port(). See CVE-2005-2973 . * sysctl-unregistration-oops.dpatch [SECURITY] Fix a potential local root exploit in the /proc/sys/net/ipv4/conf interface. See CVE-2005-2709 ****CHANGES ABI**** . * setkeys-needs-root-1.dpatch, setkeys-needs-root-2.dpatch: [SECURITY] Require root privilege to write the current function key string entry of other user's terminals. See CVE-2005-3257 . * ipv4-fragment-queues-2.1.dpatch, ipv4-fragment-queues-3.dpatch, ipv4-fragment-queues-4.dpatch: [SECURITY] Re-apply the -3 and -4 patches, which were dropped in 2.6.8-15 to avoid an ABI change. Unapply the -2.1 patch which is superseded by -3. See CVE-2005-0449 ****CHANGES ABI**** . * ptrace-fix_self-attach_rule.dpatch: [SECURITY] Use the thread group ID to check if it a self-attach. Fixes a local DoS (crash). See CVE-2005-3783 . * valid_signal.dpatch Adds the valid_signal() macro, needed by async-urb-delivery-oops.dpatch . * async-urb-delivery-oops.dpatch, async-urb-delivery-oops-2.dpatch: [SECURITY] Fix oops that can result from a process terminating before an issued URB request completes. Requires valid_signal.dpatch See CVE-2005-3055 . * fs_coda_coverty.dpatch: [SECURITY] Add bounds checking to coda fs. See CVE-2005-0124 . * io_edgeport_overflow.dpatch: [SECURITY] fix buffer overflow (underflow, really) that opens multiple attack vectors. See CVE-2004-1017 . * mqueue-double-increment.dpatch: [SECURITY] Fix double increment of mqueue_mnt->mnt_count in sys_mq_open. See CVE-2005-3356 . * sysctl-buffer-overflow.dpatch: [SECURITY] Fix a potential overflow in sysctl buffer termination code. See CVE-2005-4618 . * sparc64-clock-settime.dpatch [SECURITY] Remove unnecessary sign-extension in compat_sys_clock_settime, fixing a DoS vulnerability on sparc systems. See CVE-2006-0482 Files: f98203872db1017d6053ababb496116d 1004 devel optional kernel-source-2.6.8_2.6.8-16sarge2.dsc 0393c05ffa4770c3c5178b74dc7a4282 43929719 devel optional kernel-source-2.6.8_2.6.8.orig.tar.gz 0bb501098f732e6750e3413f4e9d148f 1015096 devel optional kernel-source-2.6.8_2.6.8-16sarge2.diff.gz 4451df70d7b6df9b00ad788712959db3 1043588 devel optional kernel-patch-debian-2.6.8_2.6.8-16sarge2_all.deb 826e6dc98eed9696f9070afd83a72559 34936164 devel optional kernel-source-2.6.8_2.6.8-16sarge2_all.deb 28717b85541e3aa8aa872f61798d23fc 33842 devel optional kernel-tree-2.6.8_2.6.8-16sarge2_all.deb 52e464ad87d3d29f61211c3a20232459 6181586 doc optional kernel-doc-2.6.8_2.6.8-16sarge2_all.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux) iD8DBQFEIYeQXm3vHE4uyloRAgrwAKDO7PWu7Xg0em1f+s7rLqmmp8C4bACfcxI4 L4p0NS/TcM8ADT3dRNfqopg= =ULsU -----END PGP SIGNATURE----- Accepted: kernel-doc-2.6.8_2.6.8-16sarge2_all.deb to pool/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge2_all.deb kernel-patch-debian-2.6.8_2.6.8-16sarge2_all.deb to pool/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge2_all.deb kernel-source-2.6.8_2.6.8-16sarge2.diff.gz to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge2.diff.gz kernel-source-2.6.8_2.6.8-16sarge2.dsc to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge2.dsc kernel-source-2.6.8_2.6.8-16sarge2_all.deb to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge2_all.deb kernel-tree-2.6.8_2.6.8-16sarge2_all.deb to pool/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge2_all.deb