Accepted kernel-source-2.4.27 2.4.27-9 (source)
Daniel Holbach
dh at mailempfang.de
Wed Apr 6 12:10:28 CDT 2005
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Origin: Debian/unstable
Format: 1.7
Date: Wed, 06 Apr 2005 18:07:24 +0100
Source: kernel-source-2.4.27
Binary: kernel-source-2.4.27, kernel-tree-2.4.27, kernel-doc-2.4.27, kernel-patch-debian-2.4.27
Architecture: source
Version: 2.4.27-9
Distribution: hoary
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel at lists.debian.org>
Changed-By: Daniel Holbach <dh at mailempfang.de>
Description:
kernel-source-2.4.27 - Linux kernel source for version 2.4.27 with Debian patches
Closes: 285521 285563 288046 288272 288279 288712 289202 289517 289682 290013 290039 291536 296639 296700 296905
Changes:
kernel-source-2.4.27 (2.4.27-9) unstable; urgency=low
.
* There was a stray file in 2.4.27-8. Don't include it this time.
(Simon Horman) (closes: Bug#291536)
.
* Updated kernel-tree description from Martin F Krafft
(Simon Horman)
.
* Updated apply script so it can handle point versions
(Simon Horman)
.
* 134_skb_reset_ip_summed.diff: [CAN-2005-0209] resolve checksumming
exploit in fragmented packet forwarding (Joshua Kwan)
.
* 135_fix_ip_options_leak.diff: [CAN-2004-1335] fix leak of IP options
data. (Joshua Kwan)
.
* 136_vc_resizing_overflow.diff: [CAN-2004-1333] make sure VC resizing
fits in 16 bits. (Joshua Kwan)
.
* 137_io_edgeport_overflow.diff: [CAN-2004-1017] fix buffer overflow
(underflow, really) that opens multiple attack vectors. (Joshua Kwan)
.
* 138_amd64_syscall_vuln.diff: [CAN-2004-1144] fix the "int 0x80 hole"
that allowed overflow of the system call table. (Joshua Kwan)
.
* 139_sparc_context_switch.diff: fix FPU context switching dirtiness on
sparc32 SMP. (Joshua Kwan)
.
* 140_VM_IO.diff: [CAN-2004-1057] fix possible DoS from accessing freed
kernel pages by flagging VM_IO where necessary.
.
* 141_acpi_noirq.patch:
[ACPI] Enhanced PCI probe, CONFIG_HPET_TIMER build warning fix
(Simon Horman)
.
* 142_acpi_skip_timer_override-1.diff, 142_acpi_skip_timer_override-2.diff,
142_acpi_skip_timer_override-3.diff, 142_acpi_skip_timer_override-4.diff:
[ACPI] skip_timer_override including early PCI bridge detection.
(closes: #296639) (Simon Horman)
.
* 121_drm-locking-checks-3.diff: LOCK_TEST_WITH_RETURN build cleanup
(Simon Horman)
.
* 143_outs.diff:
[SECURITY]: AMD64, allows local users to write to privileged
IO ports via OUTS instruction (CAN-2005-0204) (Simon Horman)
(closes: #296700)
.
* 144_sparc64-sb1500-clock-2.4.diff by David Miller: enable recognition
of the clock chip on SunBlade 1500, it won't boot otherwise.
(Jurij Smakov).
.
* 145_insert_vm_struct-no-BUG.patch:
[SECURITY] make insert_vm_struct return an error rather than BUG().
See CAN-2005-0003. (dann frazier)
.
* 146_ip6_copy_metadata_leak.diff 147_ip_copy_metadata_leak.diff:
[SECURITY] Do not leak dst entries in ip_copy_metadata()
See CAN-2005-0210. (Simon Horman)
.
* 148_ip_evitor_smp_loop.diff:
Fix theoretical loop on SMP in ip_evictor().
(Simon Horman, Andres Salomon)
.
* 149_fragment_queue_flush.diff:
Flush fragment queue on conntrack unload. (Simon Horman, Andres Salomon)
.
* *** ABI Change! Notify D-I team or delay for future release
*** Omitted from release
*** 150_private_fragment_queues-1.diff, 150_private_fragment_queues-2.diff:
*** Keep fragment queues private to each user. See CAN-2005-0449 and
*** http://oss.sgi.com/archives/netdev/2005-01/msg01048.html
*** (Simon Horman, Andres Salomon)
.
* 151_atm_get_addr_signedness_fix.diff:
[SECURITY] Fix ATM copy-to-user usage. See: CAN-2005-0531.
See: http://www.guninski.com/where_do_you_want_billg_to_go_today_3.html
(closes: #296905) (Simon Horman)
.
* 153_ppp_async_dos.diff:
[SECURITY] remote Linux DoS on ppp servers. See: CAN-2005-0384
(Simon Horman)
.
* 111-smb-client-overflow-fix-2.diff, 111-smb-client-overflow-fix-1.diff:
[SECURITY] The above patches, included in 2.4.27-6 resolve:
local information leak caused by race in SMP systems with
more than 4GB of memory. remote information leak cansed by
handling of TRANS2 packets handling in smbfs. See CAN-2004-1191.
(see: #300163) (Simon Horman)
.
* 154_cmsg_compat_signedness_fix.diff:
Fix CMSG32_OK macros. (Dann Frazier, Simon Horman)
.
kernel-source-2.4.27 (2.4.27-8) unstable; urgency=high
.
* add dh_fixperms to the build targets to kernel-patch-debian-2.4.27
to ensure that the permissions of the files in this package are
sensible. (closes: Bug#288279) (Simon Horman)
* Turn a make conditional into a runtime conditional to allow debian/rules
prune to work. (closes: #289682) (Joshua Kwan)
.
Patches applied:
.
* 121_drm-locking-checks-1.diff, 121_drm-locking-checks-2.diff:
[SECURITY] Fix insufficient locking checks in DRM code; CAN-2004-1056
(Fabio M. Di Nitto, Dann Frazier, Simon Horman). (closes: Bug#285563)
* 122_sec_brk-locked.diff
[SECURITY] Fix vulnerability in the ELF loader code allowing
local attacker to execute code as root; CAN-2004-1235. This is better
known as the "uselib() bug". (closes: #289202) (Maximilian Attems)
* 123_nfs_verify_eacces.diff
Return -EACCES instead of -ESTALE to fix some NFS data loss bugs, already
fixed in 2.6 but not in 2.4. (closes: #288046) (Joshua Kwan)
* 124_random_poolsize_overflow.diff
[SECURITY] Fix integer overflow in random poolsize sysctl. (Simon Horman)
* 125_moxa_bound_checking.diff
[SECURITY] Fix bounds checking in moxa serial driver. (Simon Horman)
* 126_rlimit_memlock_dos.diff
[SECURITY] Fix RLIMIT_MEMLOCK local DoS (Simon Horman)
* 127_fs_coda_coverty.diff
[SECURITY] Untrusted user data in kernel. (Maxmilian Attems)
* 128_net_fose_coverty.diff
[SECURITY] Fix Coverity reported lack of bounds checking rose_rt_ioctl.
(Maximilian Attems)
* 129_net_sdla_coverty.diff
[SECURITY] Fix sdla_xfer lack of bounds checking, reported by Coverity.
(Maximilian Attems)
* 130_fs_xfs_coverty.diff
[SECURITY] Fix xfs_attrmulti_by_handle lack of bounds checking, reported
by Coverity. (Maximilian Attems)
* 131_expand_stack_race.diff
[SECURITY] Fix expand_stack race in mm.h; see CAN-2005-0001.
* 127_acpi_off.diff
Do not do acpi_early_init() if acpi=off is in effect.
(closes: #290039, #290013, #289517, #288712, #285521, #288272)
(Simon Horman)
* 133_strncpy_zero_pad.diff
[SECURITY] Make sure strncpy null terminates strings. (CAN-2003-0465)
Fix for s390x, ppc64 and s390. mips and alpha are still unfixed.
N.B. This bug appears to be minor at best
http://marc.theaimsgroup.com/?l=linux-kernel&m=105796021120436&w=2
(See: #280492) (Simon Horman)
Files:
9cc9dbdfe3f53e4c45c331ea303de95d 678025 devel optional kernel-source-2.4.27_2.4.27-9.diff.gz
c1b495a855629746033b7672ca5a9415 886 devel optional kernel-source-2.4.27_2.4.27-9.dsc
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
iQEVAwUBQlQXTAF4adwMEr3XAQIiJQf/et9jK/ZVIsst/Omo0a9i6RotTmV3rwfQ
c2wApENKQontgt4FMKtOTNuyH5dQg+22hjc+RG5lcrsTTz/q2R90NNfPx5Hk7SFn
RjKBKOzaFzGDEK5/X+tpH47YRI/R6iLOvmuxCTiCrjjCkoIS3F4hfvEc/EcgCZIQ
fkJOh0RlFj7MEaAiavqwsAplMOFdlgL7Go7yItZ0H4cIMS6eQ8ShvQaCyOZh0bh2
fuhgk82LedJZrs/QDImjo12kOGzklhtrgKLYaFVSzmzbmGPTuIrReNmWNZWdxrEH
toxeCFhm880DIqV2Gokr0t4QmmL8PlBX7lJMS9rfaJtbasYXEpkvOA==
=Iq0J
-----END PGP SIGNATURE-----
Accepted:
kernel-source-2.4.27_2.4.27-9.diff.gz
to pool/universe/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-9.diff.gz
kernel-source-2.4.27_2.4.27-9.dsc
to pool/universe/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-9.dsc
More information about the hoary-changes
mailing list