-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Tue, 18 Jan 2005 02:40:12 -0500 Source: kernel-source-2.6.10 Binary: kernel-doc-2.6.10 kernel-tree-2.6.10 kernel-patch-debian-2.6.10 kernel-source-2.6.10 Architecture: source all Version: 2.6.10-4 Distribution: unstable Urgency: low Maintainer: Debian kernel team <debian-kernel@lists.debian.org> Changed-By: Andres Salomon <[EMAIL PROTECTED]> Description: kernel-doc-2.6.10 - Linux kernel specific documentation for version 2.6.10 kernel-patch-debian-2.6.10 - Debian patches to Linux 2.6.10 kernel-source-2.6.10 - Linux kernel source for version 2.6.10 with Debian patches kernel-tree-2.6.10 - Linux kernel tree for building prepackaged Debian kernel images Closes: 283241 289610 Changes: kernel-source-2.6.10 (2.6.10-4) unstable; urgency=low . * Replace smbfs-overflow-fixes.patch with a newer version from 2.6.10-ac that actually works. Thanks to S?ren Hansen <[EMAIL PROTECTED]> for finding and submitting it. (Christoph Hellwig) (closes: #283241). . * Rework the modular ide patch: - dropped support for unloading modules that didn't find devices - splited the rest into two patches, one that fixes modular ide support and one that fixes __init vs __devinit problems. (Christoph Hellwig). . * Drop alsa-module-load-fix.dpatch, the issue has been fixed in a better way upstream. (Christoph Hellwig). . * Drop drivers-input-psaux-hacks.dpatch, the patch has effictively disabled by every architecture setting INPUT_MOUSEDEV_PSAUX_ENABLE to 'y' already. . * [alpha] Added a workaround for ext3 oops. (Norbert Tretkowski) . * Fixes emu10k1_fx8010_code_t structure using indirect pointers to be less than 8192 bytes to follow the ioctl semantics and thus not break powerpc builds. Userland ioctl value is still changed. (Sven Luther and Fabbione) . * Fix modular-vesafb.dpatch to not break the non-modular case (Christoph Hellwig) (closes: #289610). . * Fix weird alpha IO failures due to typo. (Maximilian Attems) . * [SECURITY] 033-rlimit_memlock_check.dpatch RLIMIT_MEMLOCK isn't checked properly, allowing for a DoS attack. See http://seclists.org/lists/fulldisclosure/2005/Jan/0270.html for more details. This patch fixes it, and all reorganizes the stack resize stuff a bit (*sigh*) (Andres Salomon). . * [SECURITY] 034-stack_resize_exploit.dpatch Fix exploitable race condition on SMP and HT systems where two threads attempt to expand the stack at the same time. This is CAN-2005-0001 (happy new year!) (Andres Salomon). . * [SECURITY] 035-do_brk_security_fixes-2.dpatch Further do_brk fixes; just to be safe, lock everywhere do_brk is used (Andres Salomon). . * Apply patch to fix compat cmsg_len checks (Christoph Hellwig). . * More modular-vesafb updates/cleanups (Andres Salomon). . * [SECURITY] 036-rlimit_memlock_check-2.dpatch Add missing memory check; needed by 033-rlimit_memlock_check.patch (Andres Salomon). . * 037-sctp_err_lookup_oops.dpatch In case of an error, sk never gets set; thus, sock_put(sk) messes up (Andres Salomon). . * 038-ftdi_sio_debug_output.dpatch Make ftdi_sio driver output debug message instead of error if attempting to write 0 bytes (Andres Salomon). . * 039-serial_console_resume.dpatch Don't assume a port has a tty associated w/ it when resuming (Andres Salomon). . * 040-sk_forward_alloc_underflow.dpatch Do not underflow sk_forward_alloc from tcp_sendpage (Andres Salomon). . * 041-ide_hwif_supress_busy.dpatch While probing ide interfaces, supress error messages for non-existent ones (Andres Salomon). . * 042-gx_get_cpuspeed_return_value.dpatch gx_get_cpuspeed was returning the wrong value; this fixes it (Andres Salomon). . * 043-dothan_p4_get_frequency.dpatch Pentium M (Dothan) model is 0x0d, not 0x13 (Andres Salomon). . * 044-elevator_noop_add_request.dpatch elevator_noop_add_request() ignored the 'where' arg, which specified where the request should be added (front, back..) (Andres Salomon). . * [SPARC64] 045-pci_psycho_brainfart.dpatch Incorrect register values are used inside __psycho_check_one_stc if PBM type is B (Andres Salomon). . * 046-ipv6_sit_lock.dpatch Fix locking issue inside ipip6_tunnel_link() (Andres Salomon). . * 047-do_tcp_sendpages_tso_assertion.dpatch do_tcp_sendpages() didn't track skb->truesize correctly; this causes partially ACK'd TSO frames to potentially corrupt stuff as skb->truesize is too small (Andres Salomon). . * 048-matroxfb_mtrr_ifdef.dpatch The mtrr stuff in the matroxfb driver needs to be wrapped w/ CONFIG_MTRR ifdefs (Andres Salomon). . * 050-cfq_requeue_request_accounting.dpatch cfq_requeue_request can potentially decrement a counter past 0; we want to only decrement it if it's > 0 (Andres Salomon). Files: 6d7e401ba21df7f064342fc9bd9d4607 996 devel optional kernel-source-2.6.10_2.6.10-4.dsc 7ffbe9ec0bed4f42b9071d51e870ba00 257162 devel optional kernel-source-2.6.10_2.6.10-4.diff.gz f5953759469ed5b8922422917b304d80 271734 devel optional kernel-patch-debian-2.6.10_2.6.10-4_all.deb 9eb8efc831d7e48fad5119f7a1f45b37 35834934 devel optional kernel-source-2.6.10_2.6.10-4_all.deb edb5273c4846604c376823640c1018dc 29034 devel optional kernel-tree-2.6.10_2.6.10-4_all.deb 89510868140164c9a872e5709415685f 6729448 doc optional kernel-doc-2.6.10_2.6.10-4_all.deb
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.5 (GNU/Linux) iD8DBQFB7MD178o9R9NraMQRAvT8AJ4i65HcRgRU3L2ilk+V4+6UcDiq/QCff6ae jZosx3SCwCSr56AVTWB8rCE= =G/v5 -----END PGP SIGNATURE----- Accepted: kernel-doc-2.6.10_2.6.10-4_all.deb to pool/main/k/kernel-source-2.6.10/kernel-doc-2.6.10_2.6.10-4_all.deb kernel-patch-debian-2.6.10_2.6.10-4_all.deb to pool/main/k/kernel-source-2.6.10/kernel-patch-debian-2.6.10_2.6.10-4_all.deb kernel-source-2.6.10_2.6.10-4.diff.gz to pool/main/k/kernel-source-2.6.10/kernel-source-2.6.10_2.6.10-4.diff.gz kernel-source-2.6.10_2.6.10-4.dsc to pool/main/k/kernel-source-2.6.10/kernel-source-2.6.10_2.6.10-4.dsc kernel-source-2.6.10_2.6.10-4_all.deb to pool/main/k/kernel-source-2.6.10/kernel-source-2.6.10_2.6.10-4_all.deb kernel-tree-2.6.10_2.6.10-4_all.deb to pool/main/k/kernel-source-2.6.10/kernel-tree-2.6.10_2.6.10-4_all.deb -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]