Accepted linux-source-2.6.9 2.6.9-1 (source)

Fabio M. Di Nitto fabbione at fabbione.net
Wed Dec 1 07:36:19 CST 2004


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 29 Nov 2004 10:07:36 +0100
Source: linux-source-2.6.9
Binary: linux-headers-2.6.9-1-686-smp linux-headers-2.6.9-1-386 linux-image-2.6.9-1-amd64-xeon linux-doc-2.6.9 linux-image-2.6.9-1-power3 linux-image-2.6.9-1-power4 linux-headers-2.6.9-1-k7 linux-patch-debian-2.6.9 linux-image-2.6.9-1-k7 linux-headers-2.6.9-1-power3 linux-headers-2.6.9-1-sparc64-smp linux-image-2.6.9-1-powerpc linux-headers-2.6.9-1-sparc64 linux-image-2.6.9-1-sparc64 linux-headers-2.6.9-1-power4-smp linux-image-2.6.9-1-power3-smp linux-image-2.6.9-1-amd64-generic linux-headers-2.6.9-1-power4 linux-headers-2.6.9-1 linux-headers-2.6.9-1-amd64-k8-smp linux-tree-2.6.9 linux-headers-2.6.9-1-amd64-k8 linux-source-2.6.9 linux-image-2.6.9-1-amd64-k8 linux-image-2.6.9-1-powerpc-smp linux-headers-2.6.9-1-686 linux-image-2.6.9-1-amd64-k8-smp linux-headers-2.6.9-1-amd64-xeon linux-headers-2.6.9-1-amd64-generic linux-image-2.6.9-1-power4-smp linux-image-2.6.9-1-386 linux-headers-2.6.9-1-powerpc linux-headers-2.6.9-1-powerpc-smp linux-image-2.6.9-1-686 linux-image-2.6.9-1-sparc64-smp linux-image-2.6.9-1-686-smp linux-headers-2.6.9-1-k7-smp linux-image-2.6.9-1-k7-smp linux-headers-2.6.9-1-power3-smp
Architecture: source
Version: 2.6.9-1
Distribution: hoary
Urgency: low
Maintainer: Fabio M. Di Nitto <fabbione at fabbione.net>
Changed-By: Fabio M. Di Nitto <fabbione at fabbione.net>
Description: 
 linux-doc-2.6.9 - Linux kernel specific documentation for version 2.6.9
 linux-headers-2.6.9-1 - Header files related to Linux kernel version 2.6.9
 linux-headers-2.6.9-1-386 - Linux kernel headers 2.6.9 on 386
 linux-headers-2.6.9-1-686 - Linux kernel headers 2.6.9 on PPro/Celeron/PII/PIII/PIV
 linux-headers-2.6.9-1-686-smp - Linux kernel headers 2.6.9 on PPro/Celeron/PII/PIII/PIV SMP
 linux-headers-2.6.9-1-amd64-generic - Linux kernel headers 2.6.9 on x86_64
 linux-headers-2.6.9-1-amd64-k8 - Linux kernel headers 2.6.9 on AMD K8
 linux-headers-2.6.9-1-amd64-k8-smp - Linux kernel headers 2.6.9 on AMD K8 SMP
 linux-headers-2.6.9-1-amd64-xeon - Linux kernel headers 2.6.9 on Intel x86_64
 linux-headers-2.6.9-1-k7 - Linux kernel headers 2.6.9 on AMD K7
 linux-headers-2.6.9-1-k7-smp - Linux kernel headers 2.6.9 on AMD K7 SMP
 linux-headers-2.6.9-1-power3 - Linux kernel headers 2.6.9 on Power3
 linux-headers-2.6.9-1-power3-smp - Linux kernel headers 2.6.9 on Power3 SMP
 linux-headers-2.6.9-1-power4 - Linux kernel headers 2.6.9 on Power4
 linux-headers-2.6.9-1-power4-smp - Linux kernel headers 2.6.9 on Power4 SMP
 linux-headers-2.6.9-1-powerpc - Linux kernel headers 2.6.9 on PowerPC
 linux-headers-2.6.9-1-powerpc-smp - Linux kernel headers 2.6.9 on PowerPC SMP
 linux-headers-2.6.9-1-sparc64 - Linux kernel headers 2.6.9 on uniprocessor 64-bit SPARC
 linux-headers-2.6.9-1-sparc64-smp - Header files for Linux kernel 2.6.9 on multiprocessor 64-bit SPAR
 linux-image-2.6.9-1-386 - Linux kernel image for version 2.6.9 on 386.
 linux-image-2.6.9-1-686 - Linux kernel image for version 2.6.9 on PPro/Celeron/PII/PIII/PIV
 linux-image-2.6.9-1-686-smp - Linux kernel image for version 2.6.9 on PPro/Celeron/PII/PIII/PIV
 linux-image-2.6.9-1-amd64-generic - Linux kernel image for version 2.6.9 on x86_64.
 linux-image-2.6.9-1-amd64-k8 - Linux kernel image for version 2.6.9 on AMD K8.
 linux-image-2.6.9-1-amd64-k8-smp - Linux kernel image for version 2.6.9 on AMD K8 SMP.
 linux-image-2.6.9-1-amd64-xeon - Linux kernel image for version 2.6.9 on Intel x86_64.
 linux-image-2.6.9-1-k7 - Linux kernel image for version 2.6.9 on AMD K7.
 linux-image-2.6.9-1-k7-smp - Linux kernel image for version 2.6.9 on AMD K7 SMP.
 linux-image-2.6.9-1-power3 - Linux kernel image for version 2.6.9 on Power3.
 linux-image-2.6.9-1-power3-smp - Linux kernel image for version 2.6.9 on Power3 SMP.
 linux-image-2.6.9-1-power4 - Linux kernel image for version 2.6.9 on Power4.
 linux-image-2.6.9-1-power4-smp - Linux kernel image for version 2.6.9 on Power4 SMP.
 linux-image-2.6.9-1-powerpc - Linux kernel image for version 2.6.9 on PowerPC.
 linux-image-2.6.9-1-powerpc-smp - Linux kernel image for version 2.6.9 on PowerPC SMP.
 linux-image-2.6.9-1-sparc64 - Linux kernel binary image for UltraSPARC (sparc64) systems
 linux-image-2.6.9-1-sparc64-smp - Linux kernel binary image for SMP UltraSPARC (sparc64) systems
 linux-patch-debian-2.6.9 - Debian patches to Linux 2.6.9
 linux-source-2.6.9 - Linux kernel source for version 2.6.9 with Debian patches
 linux-tree-2.6.9 - Linux kernel tree for building prepackaged Debian kernel images
Changes: 
 linux-source-2.6.9 (2.6.9-1) hoary; urgency=low
 .
   Changes by Fabio M. Di Nitto:
 .
   * [SECURITY] Serialize dgram read using semaphore just like stream.
     + Add the following patches:
       . unix-sem.dpatch (CAN-2004-1068)
 .
   * [SECURITY] Fix insufficient locking checks in DRM code.
     + Add the following patches:
       . drm-fixes.dpatch (CAN-2004-1056)
 .
   * [SECURITY] Fix SELinux crashes with SOCK_SEQPACKET; see
     http://marc.theaimsgroup.com/?l=linux-kernel&m=110045613004761
     for reference:
     + Add the following patches:
       . selinux-fixes.dpatch (CAN-2004-1069)
 .
   * [SECURITY] Fix problems in VM_IO refcount:
     + Add the following patches:
       . vmio.dpatch (CAN has not been assigned yet)
 .
   * [SECURITY] Fix problems in binfmt_elf loader; see
     http://isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt for more
     details (Andres Salomon):
     + Add the following patches:
       . elf-loader-fixes.dpatch (CAN-2004-1070/1/2/3)
 .
     Several flaws have been found in the Linux ELF binary loader's
     handling of setuid binaries. Nowadays ELF is the standard format for
     Linux executables and libraries. setuid binaries are programs that
     have the "setuid" file permission bit set; they allow to execute a
     program under a user id different from the calling user and are
     mostly used to allow executing a program with root privileges to
     normal users.
 .
     The vulnerabilities that were fixed in these updated kernel packages
     could lead Denial of Service attacks. They also might lead to
     execution of arbitrary code and privilege escalation on some
     platforms if an attacker is able to run setuid programs under some
     special system conditions (like very little remaining memory).
 .
     Another flaw could allow an attacker to read supposedly unreadable,
     but executable suid binaries. The attacker can then use this to seek
     faults within the executable.
 .
   * [SECURITY] Further binfmt_elf fixes, and binfmt_aout fixes as well
     (Andres Salomon).
     + Add the following patches:
       . elf-loader-fixes-the-return.dpatch (CAN-2004-1070/1/2/3)
       . aout-loader-fixes.dpatch (CAN-2004-1074)
 .
     http://marc.theaimsgroup.com/?l=linux-kernel&m=109776571411003&w=2:
 .
     Bernard Gagnon discovered a memory leak in the mmap raw packet
     socket implementation. When a client application (in ELF format)
     core dumps, a region of memory stays allocated as a ring buffer.
     This could be exploited by a malicious user who repeatedly crashes
     certain types of applications until the memory is exhausted, thus
     causing a Denial of Service.
 .
   * [SECURITY] s390: sacf local root exploit (Andres Salomon).
     + Add the following patches:
       . s390-sacf-fix.dpatch (CAN-2004-0887)
 .
   * [SECURITY] Further smbfs overflow fixes, stolen from -ac tree
     (Andres Salomon).
     + Add the following patches:
       . smbfs-overflow-fixes.dpatch (CAN-2004-0883 CAN-2004-0949)
 .
     During an audit of the smb file system implementation within Linux,
     several vulnerabilities were discovered ranging from out of bounds
     read accesses to kernel level buffer overflows.
 .
     To exploit any of these vulnerabilities, an attacker needs control
     over the answers of the connected Samba server. This could be
     achieved by man-in-the-middle attacks or by taking over the
     Samba server with e. g. the recently disclosed vulnerability in
     Samba 3.x (see CAN-2004-0882).
 .
     While any of these vulnerabilities can be easily used as remote denial
     of service exploits against Linux systems, it is unclear if it is
     possible for a skilled local or remote attacker to use any of the
     possible buffer overflows for arbitrary code execution in kernel
     space. So these bugs may theoretically lead to privilege escalation
     and total compromise of the whole system.
 .
   * [SECURITY] reverted 486 emulation patch:
     + Delete the following patches:
       . x86-i486_emu.dpatch
 .
     Ubuntu kernels for the i386 platforms are compiled using the i486
     instruction set for performance reasons. Former Ubuntu kernels
     contained code which emulated the missing instructions on real 386
     processors. However, several actual and potential security flaws
     have been discovered in the code, and it was found to be
     unsupportable. It might be possible to exploit these
     vulnerabilities also on i486 and higher processors.
 .
     Therefore support for real i386 processors has ceased. This updated
     kernel will only run on i486 and newer processors.
 .
     Other architectures supported by Ubuntu (amd64, powerpc)
     are not affected.
 .
   * Resync with Debian (debian/patches/*) up to 2.6.9-3.
 .
   * New upstream release:
     + Update debian/control.stub.
     + Update debian/d-i/*/kernel-versions
     + Delete the following patches:
       . acpi-20040826.dpatch
       . acpi-early.dpatch
       . acpi-osname.dpatch
       . acpi-speedstep-fix.dpatch
       . alpha-epoch-comment.dpatch
       . bio-mem-leak.dpatch
       . capi-skb-free.dpatch
       . cbq-leak.dpatch
       . cciss-update.dpatch
       . drivers-ftape.dpatch
       . drivers-input-hiddev-HIDIOCGUCODE.dpatch
       . drivers-macintosh-adb-trackpad.dpatch
       . drivers-scsi-sym_2-dv-hang.dpatch
       . fix-sn_console-for-config_smp.dpatch
       . include-missing-includes.dpatch
       . marvell-mm.dpatch
       . minix-block-accounting-fix.dpatch
       . nfsd-subtreecheck-nostale.dpatch
       . openpromfs-loop.dpatch
       . pmac-no-of-stdout.dpatch
       . powerpc-g4-errata.dpatch
       . ptmx-fix.dpatch
       . qdisc-cache-align.dpatch
       . SG_IO-safe-commands-2.dpatch
       . shm-segment-count-fix.dpatch
       . skge-hotplug.dpatch
       . skge-hotplug-2.dpatch
       . sparc32-export-more-ksyms.dpatch
       . sparc64-sunsab-fix.dpatch
       . sparc64-syslog-register.dpatch
       . sparc64-update.dpatch
       . tcp-win-scale.dpatch
       . therm_adt746x-schedule.dpatch
       . usb-storage-vendor-count.dpatch
       . via-velocity.dpatch
       . via-velocity-2.dpatch
       . xfs-ioctl32.dpatch
     + Update the following patches:
       . ia64-generic-no-smp.dpatch
       . ia64-generic-no-smp-1-to-2.dpatch
       . modular-ide.dpatch
       . modular-vesafb.dpatch
       . drivers-net-tg3-readd.dpatch
       . tg3-update.dpatch
       . sata-nv-no-reset.dpatch
       . wlan-ng-prism2-usb.dpatch
     + Add the following patches
       . ext3-directio-leak-fix.dpatch
       . ppc64-iSeries-build-fix.dpatch
       . ia64-sn-move-irq-noop.dpatch
       . mm-vmscan.dpatch
       . alpha-writeq-fix.dpatch
       . drivers-serial-sn_console-up-buildfix.dpatch
       . ia64-hp-sba_iommu-fix.dpatch
       . SG_IO-safe-commands-1.dpatch
       . parport_pc-via8231.dpatch
       . drivers-pci-quirks-via8233a.dpatch
       . fs-tmpfs-free_inode-leak.dpatch
       . drivers-ide-dma-ricoh.dpatch
       . vlan-update-1.dpatch
       . ata_piix-combinde-mode-fix-2.dpatch
       . drivers-serial-8250-ioremap-fix.dpatch
       . tty-locking-fixes9.dpatch
       . dm_io-ENOMEM-goof.dpatch
     + Temporary disable the following patches that seems to be applied
       upstream with a different implementation:
       . mlock-as-user.dpatch
       . sk98lin-update.dpatch
       . marvell-pegasos-2.dpatch
 .
   * Update i386 config files (new entries):
     . LOCALVERSION=""
     . SHMEM=y
     . PM_DEBUG=n
     . ACPI_BLACKLIST_YEAR=0
     . CPU_FREQ_GOV_ONDEMAND=m
     . HOTPLUG_PCI_ACPI_IBM=m
     . BLK_DEV_UB=m
     . MEGARAID_NEWGEN=n (try to avoid regressions)
     . MEGARAID_LEGACY=m
     . MD_RAID10=m
     . INET_TUNNEL=m
     . IP_NF_CT_ACCT=y
     . IP_NF_CT_PROTO_SCTP=m
     . IP_NF_MATCH_SCTP=m
     . IP_NF_MATCH_COMMENT=m
     . IP6_NF_MATCH_PHYSDEV=m
     . R8169_NAPI=n
     . SERIO_RAW=m
     . JOYSTICK_JOYDUMP=m
     . IPMI_POWEROFF=m
     . DRM Intel 830M, 845G, 852GM, 855GM, 865G=m
     . DRM_I915=m
     . I2C_ALGOPCA=m
     . I2C_PCA_ISA=m
     . SENSORS_SMSC47M1=m
     . W1_DS9490=m
     . W1_DS9490R_BRIDGE=m
     . W1_SMEM=m
     . SND_ATIIXP_MODEM=m
     . SND_USB_USX2Y=m
     . USB_SUSPEND=n
     . RPCSEC_GSS_SPKM3=m
     . KPROBES=n
     . SCHEDSTATS=n
     . CRYPTO_WP512=m
 .
   * Update ppc config files (new entries):
     . LOCALVERSION=""
     . BLK_DEV_UB=m
     . MEGARAID_NEWGEN=n
     . MEGARAID_LEGACY=m
     . MD_RAID10=m
     . INET_TUNNEL=m
     . IP_NF_CT_ACCT=y
     . IP_NF_CT_PROTO_SCTP=m
     . IP_NF_MATCH_SCTP=m
     . IP_NF_MATCH_COMMENT=m
     . R8169_NAPI=n
     . SERIO_RAW=m
     . JOYSTICK_JOYDUMP=m
     . INPUT_PCSPKR=m
     . IPMI_POWEROFF=m
     . I2C_ALGOPCA=m
     . I2C_PCA_ISA=m
     . SENSORS_SMSC47M1=m
     . W1_DS9490=m
     . W1_DS9490R_BRIDGE=m
     . W1_SMEM=m
     . SND_ATIIXP_MODEM=m
     . SND_USB_USX2Y=m
     . USB_SUSPEND=n
     . RPCSEC_GSS_SPKM3=m
     . SCHEDSTATS=n
     . CRYPTO_WP512=m
 .
   * Update amd64 config files (new entries):
     . LOCALVERSION=""
     . SHMEM=y
     . PM_DEBUG=n
     . ACPI_BLACKLIST_YEAR=0
     . CPU_FREQ_GOV_ONDEMAND=m
     . X86_SPEEDSTEP_CENTRINO=m
     . X86_SPEEDSTEP_CENTRINO_ACPI=y
     . X86_ACPI_CPUFREQ=m
     . X86_ACPI_CPUFREQ_PROC_INTF=y
     . UNORDERED_IO=n
     . HOTPLUG_PCI_ACPI_IBM=m
     . BLK_DEV_UB=m
     . MEGARAID_NEWGEN=n
     . MEGARAID_LEGACY=m
     . MD_RAID10=m
     . INET_TUNNEL=m
     . IP_NF_CT_ACCT=y
     . IP_NF_CT_PROTO_SCTP=m
     . IP_NF_MATCH_SCTP=m
     . IP_NF_MATCH_COMMENT=m
     . IP6_NF_MATCH_PHYSDEV=m
     . R8169_NAPI=n
     . SERIO_RAW=m
     . JOYSTICK_JOYDUMP=m
     . IPMI_POWEROFF=m
     . I2C_ALGOPCA=m
     . I2C_PCA_ISA=m
     . SENSORS_SMSC47M1=m
     . W1_DS9490=m
     . W1_DS9490R_BRIDGE=m
     . W1_SMEM=m
     . SND_ATIIXP_MODEM=m
     . SND_USB_USX2Y=m
     . USB_SUSPEND=n
     . RPCSEC_GSS_SPKM3=m
     . CRYPTO_WP512=m
 .
   * Update sparc config files (new entries):
     . LOCALVERSION=""
     . BLK_DEV_UB=m
     . MEGARAID_NEWGEN=n
     . MEGARAID_LEGACY=m
     . MD_RAID10=m
     . INET_TUNNEL=m
     . IP_NF_CT_ACCT=y
     . IP_NF_CT_PROTO_SCTP=m
     . IP_NF_MATCH_SCTP=m
     . IP_NF_MATCH_COMMENT=m
     . IP6_NF_MATCH_PHYSDEV=m
     . SERIO_RAW=m
     . I2C_ALGOPCA=m
     . I2C_PCA_ISA=m
     . SENSORS_SMSC47M1=m
     . RPCSEC_GSS_SPKM3=m
     . SND_ATIIXP_MODEM=m
     . SND_USB_USX2Y=m
     . CRYPTO_WP512=m
 .
   * Disable CONFIG_DRM_GAMMA. The driver is broken.
 .
   * Add inotify-0.16-wip-rml-2.6.10-rc2-9.dpatch and enables it in the
     configurations (CONFIG_INOTIFY=y)
 .
   * Add patch sparc64-inotify-0.16-wip-rml-2.6.10-rc2-9.dpatch. The patch
     doesn't modify the inotify code, but it makes it visible to Kconfig.
     In the specific sparc64 has a special way to handle drivers/char
     compared to other archs and it drivers need to be added on a case
     by case base.
 .
   Changes by Daniel Stone:
 .
   * Add sysfs support to ndiswrapper:
     + Add the following patches:
       . ndiswrapper-2.dpatch
     + Obsolete the following patches:
       . ndiswrapper.dpatch
     (Closes: Ubuntu #3279)
 .
   * Add support for IBM ThinkPad TrackPoint devices:
     + Add the following patches:
       . ibm-trackpoint-support.dpatch
     (Closes: Ubuntu #2124)
Files: 
 3539687965d72f4478006b0dfd3441a3 2052 devel optional linux-source-2.6.9_2.6.9-1.dsc
 6b588f7c1a9021dc218fa74cbe9dcd99 45882595 devel optional linux-source-2.6.9_2.6.9.orig.tar.gz
 c019e513afe4ca8eba7d333ad1e6c9bf 3216432 devel optional linux-source-2.6.9_2.6.9-1.diff.gz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFBrce6hCzbekR3nhgRAjmOAJ4lKd2ZyJi8+Zp7eSdUlMqM1VEhLACgnVOK
/zqlXI3mgjW+SVGxd6rfJHk=
=+CBB
-----END PGP SIGNATURE-----


Accepted:
linux-source-2.6.9_2.6.9-1.diff.gz
  to pool/main/l/linux-source-2.6.9/linux-source-2.6.9_2.6.9-1.diff.gz
linux-source-2.6.9_2.6.9-1.dsc
  to pool/main/l/linux-source-2.6.9/linux-source-2.6.9_2.6.9-1.dsc
linux-source-2.6.9_2.6.9.orig.tar.gz
  to pool/main/l/linux-source-2.6.9/linux-source-2.6.9_2.6.9.orig.tar.gz




More information about the hoary-changes mailing list