Author: horms Date: Fri Jan 6 05:57:53 2006 New Revision: 5304 Modified: dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog Log: * Errata for 2.4.27-8 [SECURITY] SDLA firmware upgrade should require CAP_SYS_RAWIO; Local privelage escalation. See CVE-2006-0096 This was incorrectly annotated in 2.4.27-8 as an overflow discovered using coverty, which is actually CVE-2004-2607 129_net_sdla_coverty.diff, included in 2.4.27-8
Modified: dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog ============================================================================== --- dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog (original) +++ dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog Fri Jan 6 05:57:53 2006 @@ -14,6 +14,13 @@ http://linux.bkbits.net:8080/linux-2.4/[EMAIL PROTECTED] 184_arch-x86_64-ia32-ptrace32-oops.diff, included in 2.4.27-10sarge1 + * Errata for 2.4.27-8 + [SECURITY] SDLA firmware upgrade should require CAP_SYS_RAWIO; + Local privelage escalation. See CVE-2006-0096 + This was incorrectly annotated in 2.4.27-8 as an overflow + discovered using coverty, which is actually CVE-2004-2607 + 129_net_sdla_coverty.diff, included in 2.4.27-8 + * [Security] Restrict socket policy loading to CAP_NET_ADMIN. See CAN-2005-2555. 185_net-sockglue-cap.diff @@ -78,8 +85,8 @@ * 150_private_fragment_queues-1.diff, 150_private_fragment_queues-2.diff: Keep fragment queues private to each user. See CAN-2005-0449 and http://oss.sgi.com/archives/netdev/2005-01/msg01048.html - - -- Simon Horman <[EMAIL PROTECTED]> Tue, 20 Dec 2005 11:05:02 +0900 + + -- Simon Horman <[EMAIL PROTECTED]> Fri, 6 Jan 2006 14:54:46 +0900 kernel-source-2.4.27 (2.4.27-10sarge1) stable-security; urgency=high _______________________________________________ Kernel-svn-changes mailing list Kernel-svn-changes@lists.alioth.debian.org http://lists.alioth.debian.org/mailman/listinfo/kernel-svn-changes