Debian GNU/Linux
Debian Security Advisory DSA 1259-1 security@debian.org
http://www.debian.org/security/
Moritz Muehlenhoff
February 14th, 2007 http://www.debian.org/security/faq
Package : fetchmail
Vulnerability : programming error
Problem-Type : remote
Debian-specific: no
CVE ID : CVE-2006-5867
Isaac Wilcox discovered that fetchmail, a popular mail retrieval
and forwarding utility, insufficiently enforces encryption of
connections, which might lead to information disclosure.
For the stable distribution (sarge) this problem has been fixed
in version 6.2.5-12sarge5.
For the upcoming stable distribution (etch) this problem has
been fixed in version 6.3.6~rc5-1.
For the unstable distribution (sid) this problem has been fixed
in version 6.3.6~rc5-1.
We recommend that you upgrade your fetchmail package.
Upgrade Instructions
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge
Source archives:
http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5.dsc
Size/MD5 checksum: 650
6f33289df330ad5d6b73a970a131717d
http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5.diff.gz
Size/MD5 checksum: 155433
092b1d26d52b001b85b5afb66936fe90
http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5.orig.tar.gz
Size/MD5 checksum: 1257376
9956b30139edaa4f5f77c4d0dbd80225
Architecture independent components:
http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail-ssl_6.2.5-12sarge5_all.deb
Size/MD5 checksum: 42390
da1c1f925e68bf2385b071648db81f66
http://security.debian.org/pool/updates/main/f/fetchmail/fetchmailconf_6.2.5-12sarge5_all.deb
Size/MD5 checksum: 101492
2afde54d68ae7174551613028c91403d
Alpha architecture:
http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_alpha.deb
Size/MD5 checksum: 573554
69b08d3a3471630a9a844da3cf2389c9
AMD64 architecture:
http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_amd64.deb
Size/MD5 checksum: 556356
2411990fef9d0a6a9ee41db1c33afad2
ARM architecture:
http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_arm.deb
Size/MD5 checksum: 549686
5daedcf04842d2e5b540e88f70235ff4
HP Precision architecture:
http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_hppa.deb
Size/MD5 checksum: 562170
b0ef556bf0a065dd545b1381394d32c3
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_i386.deb
Size/MD5 checksum: 548738
6fc67ff75514e65d15c1ccd78f471046
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_ia64.deb
Size/MD5 checksum: 597726
4d3cb4897d0c4b410962a7694c711647
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_m68k.deb
Size/MD5 checksum: 538548
84679550a984c949b8869d4b385fa815
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_mips.deb
Size/MD5 checksum: 557342
916d92cfc83e97bccd112408b78261cb
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_mipsel.deb
Size/MD5 checksum: 557230
566a25f4fa247d9d1cebc37a3daee6c7
PowerPC architecture:
http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_powerpc.deb
Size/MD5 checksum: 556706
0ac0f73bbe90d13bf73b054da7187da2
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_s390.deb
Size/MD5 checksum: 555180
fd69f70a49c73046cd1c265e3b1fd80d
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_sparc.deb
Size/MD5 checksum: 549578
28ca03faddd6b6ff3958243012e681a4
These files will probably be moved into the stable distribution
on its next update.
Debian Security Advisory DSA 1260-1 security@debian.org
http://www.debian.org/security/
Moritz Muehlenhoff
February 14th, 2007 http://www.debian.org/security/faq
Package : imagemagick
Vulnerability : buffer overflow
Problem-Type : local(remote)
Debian-specific: no
CVE ID : CVE-2007-0770
Vladimir Nadvornik discovered that the fix for a vulnerability
in the PALM decoder of Imagemagick, a collection of image
manipulation programs, was ineffective. To avoid confusion a new
CVE ID has been assigned; tha original issue was tracked as
CVE-2006-5456.
For the stable distribution (sarge) this problem has been fixed
in version 6:6.0.6.2-2.9.
For the upcoming stable distribution (etch) this problem has
been fixed in version 7:6.2.4.5.dfsg1-0.14.
For the unstable distribution (sid) this problems has been fixed
in version 7:6.2.4.5.dfsg1-0.14.
We recommend that you upgrade your imagemagick packages.
Upgrade Instructions
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge
Source archives:
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9.dsc
Size/MD5 checksum: 881
7a9c72b09064a000b21fb7f1c188f58b
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9.diff.gz
Size/MD5 checksum: 142091
882c6b166d02a3afcf7b65b935053141
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2.orig.tar.gz
Size/MD5 checksum: 6824001
477a361ba0154cc2423726fab4a3f57c
Alpha architecture:
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_alpha.deb
Size/MD5 checksum: 1473132
a64722b75a6727372eab8c5a8e9d3460
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_alpha.deb
Size/MD5 checksum: 173936
73ad6aba77ddd80a1fa1bf9cb6838a6a
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_alpha.deb
Size/MD5 checksum: 288822
6a29717cdc16bc5f7dc3527b3c04a32e
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_alpha.deb
Size/MD5 checksum: 1284370
7fe43e1953d01bfd1f40e743b43828e5
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_alpha.deb
Size/MD5 checksum: 2200348
183f4d885fb0f0aa298f80ae689eb068
http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_alpha.deb
Size/MD5 checksum: 234798
1e536b98cce30203535a21a110effc66
AMD64 architecture:
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_amd64.deb
Size/MD5 checksum: 1466442
cce61a586a2c5456e5cd9998f503dff1
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_amd64.deb
Size/MD5 checksum: 163710
f0c6e48b31063d20aad8d6801f7b01dd
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_amd64.deb
Size/MD5 checksum: 228834
c0e8f73804537f75df7260ff692e0cb6
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_amd64.deb
Size/MD5 checksum: 1195150
0162e13544100058faee672fd672bcfd
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_amd64.deb
Size/MD5 checksum: 1550468
07ae791a2fbccd31ea48bb425552308f
http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_amd64.deb
Size/MD5 checksum: 231912
ffe6aa0bc71cb5b1f367864fd94c9c0c
ARM architecture:
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_arm.deb
Size/MD5 checksum: 1466166
7a8b57092ad8fcb15ff9ac69e94f79a6
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_arm.deb
Size/MD5 checksum: 149436
f60d0449d25c294c8a9e5b111ee0dd73
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_arm.deb
Size/MD5 checksum: 234946
fc0b7d343929740700a12af92014f7b7
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_arm.deb
Size/MD5 checksum: 1204686
888ae3ff5955c8d4ba9635d2b0333357
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_arm.deb
Size/MD5 checksum: 1647748
b0ebfaba0393ad3d17cc08417e16f4f6
http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_arm.deb
Size/MD5 checksum: 230598
febfdf6b1e489ce6e9c5c195eea4d099
HP Precision architecture:
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_hppa.deb
Size/MD5 checksum: 1468434
91af04f67f24aa210f9751b23b44f1a0
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_hppa.deb
Size/MD5 checksum: 182294
22ff85bb71aa67ec2dfd07c08698a95e
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_hppa.deb
Size/MD5 checksum: 274036
2832f545f069276518a6cd91658ab495
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_hppa.deb
Size/MD5 checksum: 1404890
80a6f5944d0be3209f1fdeed9de3c1ae
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_hppa.deb
Size/MD5 checksum: 1827916
94b36feb9f8fcb3b9262d9725652e5cf
http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_hppa.deb
Size/MD5 checksum: 243918
8bbc8f0b106e7fc8160801f5e9ed4c6f
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_i386.deb
Size/MD5 checksum: 1466158
b12fb2db8d713c7d09609ce761ce511f
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_i386.deb
Size/MD5 checksum: 164504
12ffd60f5fc6c51a85016a1ebdc75d53
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_i386.deb
Size/MD5 checksum: 209010
9aeebaf3983a8bdaad0bb762609054ed
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_i386.deb
Size/MD5 checksum: 1172338
58922d27e7184a30fcdf5de44ddf9e7c
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_i386.deb
Size/MD5 checksum: 1507592
8b8d72379bacb85839b4bbf7f2d4a1b4
http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_i386.deb
Size/MD5 checksum: 234080
7ef93e742172c9a342acc2a913b65520
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_ia64.deb
Size/MD5 checksum: 1468502
0a7887202d57741c8c3be4b2dce958e2
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_ia64.deb
Size/MD5 checksum: 188402
3ade807b07759f05c264885efb99419e
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_ia64.deb
Size/MD5 checksum: 296008
82f76c8876488eca4f4818abb3d5edb4
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_ia64.deb
Size/MD5 checksum: 1605664
ebf2610607abc6410b09dc239c382c90
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_ia64.deb
Size/MD5 checksum: 2132678
5fd5d6101764eb020ae46945e52a11ed
http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_ia64.deb
Size/MD5 checksum: 273596
a13f4b344a84d94fa360162225b93c10
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_m68k.deb
Size/MD5 checksum: 1466216
6b3c7f12eb188ac46fc20fd1ffa9dfa8
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_m68k.deb
Size/MD5 checksum: 160146
b466183701680d1216ca13823170430d
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_m68k.deb
Size/MD5 checksum: 210812
dc5096668fe53c84e1675f7ae361f94b
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_m68k.deb
Size/MD5 checksum: 1073380
f5a339d2de04dc2f7de490de29ca2f4c
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_m68k.deb
Size/MD5 checksum: 1288946
33ca416bee60fa710c8efe906ad58a60
http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_m68k.deb
Size/MD5 checksum: 227038
017265076e92de6c95130780e7ca9dcd
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_mips.deb
Size/MD5 checksum: 1490302
79e518fceb087b30d2a1c14bd60b8691
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_mips.deb
Size/MD5 checksum: 155602
f77792a9077082ff893900446d286be4
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_mips.deb
Size/MD5 checksum: 254920
8fb4d82e2f40d41c7eb7418b0f43a3d1
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_mips.deb
Size/MD5 checksum: 1119298
0458271acc8b9925db07ad48e184f058
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_mips.deb
Size/MD5 checksum: 1704528
30f1e7b3b9fa83719e9b3952c6c502a7
http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_mips.deb
Size/MD5 checksum: 131418
3e77636bb19daed6ed119a627b0ce504
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_mipsel.deb
Size/MD5 checksum: 1490274
8baafda5b96b876517b06eafacbf895b
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_mipsel.deb
Size/MD5 checksum: 151714
09ef6d0f126ca139d69289799d7fb895
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_mipsel.deb
Size/MD5 checksum: 250164
b65ca0ed3b5f040f5d78a5fbdb1d5563
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_mipsel.deb
Size/MD5 checksum: 1114890
6c47dc9a27e98b670e31e5a6aa8e6daf
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_mipsel.deb
Size/MD5 checksum: 1668004
469c0f05098b4a8ec6a265632ba950bd
http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_mipsel.deb
Size/MD5 checksum: 131020
4fb92c9bb3f4d4f5caaa039b646aa9af
PowerPC architecture:
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_powerpc.deb
Size/MD5 checksum: 1471882
8d3e9a8bf55a29112ef3cdf6bf9e12e9
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_powerpc.deb
Size/MD5 checksum: 156866
d1ee7717bade0bf2cfd1286ec8f9dae8
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_powerpc.deb
Size/MD5 checksum: 227822
43e65023fad784aca3c2061703f4dbb8
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_powerpc.deb
Size/MD5 checksum: 1169594
e428dda6c063b60ed3f90ba25aaf5194
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_powerpc.deb
Size/MD5 checksum: 1684924
03e88e7f8158add8558bb4cfc0b413eb
http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_powerpc.deb
Size/MD5 checksum: 270638
27a8eaacfee84ee0103bd58f817f8cbb
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_s390.deb
Size/MD5 checksum: 1467688
e30f5f259bbfb5855468c4ca165eb311
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_s390.deb
Size/MD5 checksum: 180574
bd3a78a00b618c09182631011cca8455
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_s390.deb
Size/MD5 checksum: 230292
0e052ebfd74856a77ec7815567b581bd
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_s390.deb
Size/MD5 checksum: 1194348
558ea25312ff8ec8a39001f87f4c2f2d
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_s390.deb
Size/MD5 checksum: 1531000
a11c3e26b1d6cb2110a1eb454874b990
http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_s390.deb
Size/MD5 checksum: 242192
7180ca4868abbead48a65de84d74caf9
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_sparc.deb
Size/MD5 checksum: 1465752
1b7a5126b7ab981ba3cb2ba840405ecb
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_sparc.deb
Size/MD5 checksum: 161160
fe14a3bf7df9231eef3931dffa190882
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_sparc.deb
Size/MD5 checksum: 224424
b12e563f9c3f33fe4599cb3343387477
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_sparc.deb
Size/MD5 checksum: 1249364
9fc7b5dbfd4a964443cead1d34bf1649
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_sparc.deb
Size/MD5 checksum: 1684558
4ca62128d73a9bf8a1b8c680195da801
http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_sparc.deb
Size/MD5 checksum: 231044
3a630dd561970f121708553c6262e1d9
These files will probably be moved into the stable distribution
on its next update.
For apt-get: deb http://security.debian.org/
stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>’ and http://packages.debian.org/<pkg>
Fedora Core
Fedora Update Notification
FEDORA-2007-225
2007-02-13
Product : Fedora Core 5
Name : kernel
Version : 2.6.19
Release : 1.2288.fc5
Summary : The Linux kernel (the core of the Linux operating
system)
Description :
The kernel package contains the Linux kernel (vmlinuz), the core of
any Linux operating system. The kernel handles the basic functions
of the operating system: memory allocation, process allocation,
device input and output, etc.
Update Information:
CVE-2006-0007:
The key serial number collision avoidance code in the
key_alloc_serial function in Linux kernel 2.6.9 up to 2.6.20 allows
remote attackers to cause a denial of service (crash) via vectors
that trigger a null dereference, as originally reported as
“spinlock CPU recursion.”
Major rebase to upstream linux kernel 2.6.19.3:
www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19
www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19.1
www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19.2
www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19.3
This update also introduces ‘kernel-debug’, a variant with
additional debugging options enabled. These kernels may run with
lower performance and increased memory overhead than the non-debug
variants.
Bugs fixed:
214495, 211672
- Sat Feb 10 2007 Chuck Ebbert <cebbert@redhat.com>
- add missing “provides” for debug-devel packages
- clean up some other “provides” things
- add fixes for RHBZ#211672 (CIFS) and RHBZ#227802 (8139too)
- Wed Feb 7 2007 Chuck Ebbert <cebbert@redhat.com>
- add missing debug-devel and smp-debug-devel sections
- Wed Feb 7 2007 Chuck Ebbert <cebbert@redhat.com>
- fix up x86_64 Xen build
- Tue Feb 6 2007 Chuck Ebbert <cebbert@redhat.com>
- disable Tux
- add another GFS2 update
- add crypto key collision patch (CVE-2007-0006)
- Mon Feb 5 2007 Dave Jones <davej@redhat.com>
- Reenable Tux.
- Mon Feb 5 2007 Chuck Ebbert <cebbert@redhat.com>
- 2.6.19.3
- updated mirrors: refer to ftp ftp2.kernel.org until kernel.org
problems are fixed
- Sun Feb 4 2007 Dave Jones <davej@redhat.com>
- 2.6.19.3rc1
- Sat Feb 3 2007 Dave Jones <davej@redhat.com>
- Disable kdump options in non-kdump kernels.
- Thu Feb 1 2007 Chuck Ebbert <cebbert@redhat.com>
- Added i586 optimized AES and Blowfish modules to the i686
config - Fixed .cvsignore
- Wed Jan 31 2007 Markus Armbruster
<armbru@redhat.com>
- The previous cset folded the Xen paravirt framebuffer patch
into linux-2.6-xen.patch, and commented out the obsoleted patch
files. Remove them.
- Wed Jan 31 2007 Chuck Ebbert <cebbert@redhat.com>
- Update to 2.6.19.2
- Tue Jan 30 2007 Markus Armbruster
<armbru@redhat.com>
- Update Xen paravirt framebuffer patch to upstream xen-unstable
changeset 13066, less changeset 12680, because that breaks with
console=tty console=xvc. Also change default domU console back to
/dev/xcv0. This changes the protocol to the one accepted
upstream. - Add compatibility with guests running our initial
protocol. - Update Xen console major/minor to lanana.org-assigned
numbers.
- Wed Dec 20 2006 Dave Jones <davej@redhat.com>
- Update to 2.6.18.6 final (no changes since rc2)
- Reenable squashfs (#220293)
- Fri Dec 15 2006 Dave Jones <davej@redhat.com>
- 2.6.18.6rc2
- Wed Dec 13 2006 Dave Jones <davej@redhat.com>
- squashfs robustness fixes from Phillip Lougher.
- lower max CPU count for x86-64 to 64 CPUs.
- Thu Dec 7 2006 Juan Quintela <quintela@redhat.com>
- update xen to 2.6.18.5.
- Fix bug 211986 on xen eventchn (Glaubert).
- Tue Dec 5 2006 Dave Jones <davej@redhat.com>
- 2.6.18.5
- Disable auto-apic patch, it needs more thought.
- Enable sonypi driver for 586 kernels. (#218434)
- Tue Nov 21 2006 Juan Quintela <quintela@redhat.com>
- Update xen to 2.6.18.3.
- linux-2.6.18-xen changeset: 36186:053cdad40903
- xen-3.0.3-testing changeset: 11774:52ae8dd4bc75
- linux-2.6-xen-3.0.3 changeset: 22949:4281f5246814
- Mon Nov 20 2006 Dave Jones <davej@redhat.com>
- 2.6.18.3
- Fix CIFS mount failure when domain not specified (#211753)
- Avoid null pointer dereference in SATA Promise. (#199142)
- Fri Nov 17 2006 Dave Jones <davej@redhat.com>
- Fix up fallout from disabling utrace.
- Fri Nov 17 2006 Juan Quintela <quintela@redhat.com>
- merge xen missing bits from FC6 kernel.
- Thu Nov 16 2006 Dave Jones <davej@redhat.com>
- Fix up error handling in HFS. (MOKB-14-11-2006)
- Thu Nov 16 2006 Juan Quintela <quintela@redhat.com>
- Update xen HV to 3.0.3_0 (cset 11774).
- Update xen kernel patch to 3.0.3_0:
- linux-2.6.18-xen changeset: 36182:c6ef4b521aef
- xen-3.0.3-testing changeset: 11774:52ae8dd4bc75
- linux-2.6-xen-3.0.3 changeset: 22949:4281f5246814
- Thu Nov 16 2006 Dave Jones <davej@redhat.com>
- Fix squashfs corruption bug. (#211237)
- Drop experimental utrace from FC5.
- Fri Nov 10 2006 Juan Quintela <quintela@redhat.com>
- disable XEN_FRAMEBUFFER & XEN_KEYBOARD.
- Fri Nov 10 2006 Dave Jones <davej@redhat.com>
- Xen grant table operations security fix.
- Disable W1 (#195825)
- Thu Nov 9 2006 Dave Jones <davej@redhat.com>
- Change HZ to 1000 for increased accuracy. (Except in Xen, where
it stays at 250 for now). - TTY locking fixes.
- splice : Must fully check for FIFO
- Fix potential NULL dereference in sys_move_pages
- ISO9660 __find_get_block_slow() denial of service
CVE-2006-5757 - Fix up oops in cramfs when encountering corrupt images.
- E1000 suspend/resume fixes.
- Set CIFS preferred IO size. (#214607)
- Mon Nov 6 2006 Roland McGrath <roland@redhat.com>
- New utrace patch: fix locking snafu crash on second engine
attach.
- Sun Nov 5 2006 Dave Jones <davej@redhat.com>
- Suspend/Resume fixes for forcedeth. (#187653)
- Sat Nov 4 2006 Dave Jones <davej@redhat.com>
- 2.6.18.2
- Thu Nov 2 2006 Dave Jones <davej@redhat.com>
- Nuke broken lazy execshield xen patch.
- Use heuristics to determine whether to enable lapic on
i386.
- Wed Nov 1 2006 Dave Jones <davej@redhat.com>
- 2.6.18.2-rc1
- Tue Oct 31 2006 Dave Jones <davej@redhat.com>
- Fix UFS mounts on x86-64 (#209921)
- Fix problem where USB storage isn’t seen on reboot.
(#212191)
- Sun Oct 29 2006 Dave Jones <davej@redhat.com>
- More ext3 robustness fixes.
- Include more verbose BUG() data
- x86_64: Fix up C3 timer latency.
- Sat Oct 21 2006 Dave Jones <davej@redhat.com>
- Reenable NCPFS (#211325, #203663)
- Netpoll fixes. (#199295)
- Fri Oct 20 2006 Dave Jones <davej@redhat.com>
- Fix autofs creating bad dentries in NFS mount. (#211206,
#211207) - Fix softlockup with ips driver. (#196437)
- Further exec-shield improvements.
- Fix lockup with sky2 driver. (#202203)
- Thu Oct 19 2006 Dave Jones <davej@redhat.com>
- Export copy_4K_page for ppc64 (#211410)
- Attempt to fix CIFS bug (#211070)
- Wed Oct 18 2006 Dave Jones <davej@redhat.com>
- Fix up aic7xxx SBLKCTL register handling (#211251)
- Disable SECMARK by default. (#211115)
- Disable some extra debugging stuff that crept in.
- Remove broken VIA quirk that prevented booting on some EPIAs
(#211298)
- Tue Oct 17 2006 Dave Jones <davej@redhat.com>
- Silence noisy boot-time messages. (#180606)
- Workaround gcc bug with weak symbols (#191458)
- Don’t let speedstep-smi register on mobile Pentium4
(#204477)
- Sat Oct 14 2006 Dave Jones <davej@redhat.com>
- Fix jbd crash with 1KB block size filesystems.
- Sat Oct 14 2006 Dave Jones <davej@redhat.com>
[2.6.18-1.2200.fc5]
- 2.6.18.1
- Tue Oct 10 2006 Dave Jones <davej@redhat.com>
- DWARF2 unwinder fixes.
- Various lockdep fixes.
- Sync various other patches from the FC6 kernel.
- Sun Oct 1 2006 Dave Jones <davej@redhat.com>
- Drop the STICKY tag from acpi-cpufreq, it breaks
suspend/resume.
- Fri Sep 29 2006 Dave Jones <davej@redhat.com>
- Execshield improvements. (Bart Oldeman)
- Disable PM_DEBUG
- Thu Sep 28 2006 Roland McGrath <roland@redhat.com>
- utrace typo fix for x86-64 watchpoints (#207467)
- Thu Sep 28 2006 Dave Jones <davej@redhat.com>
- Fix ISAPNP messages on ppc32. (#207641)
- Thu Sep 28 2006 Dave Jones <davej@redhat.com>
- Another day, another round of lockdep fixes.
- Align kernel data segment to page boundary. (#206863)
- Thu Sep 28 2006 Steven Whitehouse
<swhiteho@redhat.com>
- New GFS2 patch
- Thu Sep 28 2006 Dave Jones <davej@redhat.com>
- Fix “kernel BUG at fs/buffer.c:2789!” bug
- Wed Sep 27 2006 Dave Jones <davej@redhat.com>
- yet more lockdep fixes.
- Fix a problem with XFS & the inode diet patches.
- Fix rpc_pipefs umount oops
- Enable alternative TCP congestion algorithms.
- Tue Sep 26 2006 Dave Jones <davej@redhat.com>
- Enable serverworks IDE driver for x86-64.
- More lockdep fixes.
- Mon Sep 25 2006 Jarod Wilson <
- Make kernel packages own initrd files
- Mon Sep 25 2006 John W. Linville
<linville@redhat.com>
- Add periodic work fix for bcm43xx driver
- Sat Sep 23 2006 Dave Jones <davej@redhat.com>
- Disable dgrs driver.
- Thu Sep 21 2006 Dave Jones <davej@redhat.com>
- reiserfs: make sure all dentry refs are released before calling
kill_block_super - Fix up some compile warnings
- Thu Sep 21 2006 Juan Quintela <quintela@redhat.com>
- re-enable xen.
- update xen:
- linux-2.6 changeset: 34294:dc1d277d06e0
- linux-2.6-xen-fedora changeset: 36184:47c098fdce14
- xen-unstable changeset: 11540:9837ff37e354
- update xen HV to changeset: 11540:9837ff37e354
- xen HV printf rate limit (rostedt).
- Wed Sep 20 2006 Dave Jones <davej@redhat.com>
- 2.6.18
- i965 AGP suspend support.
- AGP x8 fixes.
- Tue Sep 19 2006 Juan Quintela <quintela@redhat.com>
- updated xen configs to sync with rawhide ones (don’t be afraid,
xen0/xenU still around). - xen update.
- linux-2.6 changeset: 34228:ea3369ba1e2c
- linux-2.6-xen-fedora changeset: 36109:eefcfd07d102
- linux-2.6-xen changeset: 22905:d8ae02f7df05
- xen-unstable changeset:
11460:1ece34466781ec55f41fd29d53f6dafd208ba2fa
- Mon Sep 18 2006 Dave Jones <davej@redhat.com>
- Bring back 586smp
- Fix RTC lockdep bug. (Peter Zijlstra)
- Mon Sep 18 2006 Juan Quintela <quintela@redhat.com>
- xen HV update (cset 11470:2b8dc69744e3).
- Sun Sep 17 2006 Juan Quintela <quintela@redhat.com>
- xen update:
- linux-2.6 changeset: 34228:ea3369ba1e2c
- linux-2.6-xen-fedora changeset: 36107:47256dbb1583
- linux-2.6-xen changeset: 22905:d8ae02f7df05
- xen-unstable changeset:
11460:1ece34466781ec55f41fd29d53f6dafd208ba2fa
- Sun Sep 17 2006 Dave Jones <davej@redhat.com>
- Rebase to 2.6.18rc7-git2
- Mon Sep 11 2006 Dave Jones <davej@redhat.com>
[2.6.17-1.2187_FC5]
- Add quirk for Samsung mp3 player. (#198128)
- Sun Sep 10 2006 Dave Jones <davej@redhat.com>
- Fix up mismerge in USB storage driver.
- Sat Sep 9 2006 Dave Jones <davej@redhat.com>
- 2.6.17.13
- Fri Sep 8 2006 Dave Jones <davej@redhat.com>
- 2.6.17.12
- Thu Aug 24 2006 Jarod Wilson <
- update to 2.6.17.11
- Tue Aug 22 2006 Bill Nottingham <
- update to 2.6.17.10«
- Tue Aug 15 2006 Juan Quintela <quintela@redhat.com>
- linux-2.6-xen update
- linux-2.6.17-xen cset changeset: 29033:e6adb54afb96
- linux-2.6-xen cset 22813:80c2ccf5c330
- s/xen_version/xen_hv_cset/ as Fedora.
- update xen hv to cset 11061.
- Mon Aug 7 2006 Mike Christie <mchristi@redhat.com>
- Drop iscsi update patch.
- Mon Aug 7 2006 Dave Jones <davej@redhat.com>
- 2.6.17.8
- Fri Aug 4 2006 Dave Jones <davej@redhat.com>
- Fri Aug 4 2006 Dave Jones <davej@redhat.com>
[2.6.17-1.2171_FC5]
- 2.6.17.8rc1
- Wed Aug 2 2006 Dave Jones <davej@redhat.com>
- Readd patch to allow 460800 baud on 16C950 UARTs
- Sat Jul 29 2006 Dave Jones <davej@redhat.com>
- Silence noisy SCSI ioctl. (#200638)
- Fri Jul 28 2006 Dave Jones <davej@redhat.com>
- 2.6.17.7
- Thu Jul 27 2006 Rik van Riel <riel@redhat.com>
- reduce hypervisor stack use with -O2, this really fixes bug
(#198932)
- Tue Jul 25 2006 Rik van Riel <riel@redhat.com>
- disable debug=y hypervisor build option because of stack
overflow (#198932)
- Tue Jul 25 2006 Dave Jones <davej@redhat.com>
- Enable serio_raw (#199387)
- Sun Jul 16 2006 Dave Jones <davej@redhat.com>
- Support up to 4GB in the 586 kernel again.
- Sun Jul 16 2006 Dave Jones <davej@redhat.com>
- 2.6.17.6
- Fri Jul 14 2006 Dave Jones <davej@redhat.com>
- Reenable SMC NIC driver.
- Tue Jul 11 2006 Dave Jones <davej@redhat.com>
- 2.6.17.4
- Disable split pagetable lock
- Sat Jul 8 2006 Juan Quintela <quintela@redhat.com>
- enable CONFIG_CRASH on xen kernels.
- enable CONFIG_PCIDEV_BACKEND on xen kernels.
- make BLKDEV_FRONTEND a module on xen kernels.
- rebase with linux-2.6-xen-fedora 28918.
- Update to xen-unstable HV cset 10508.
- xen: credit scheduler is the default now.
- Wed Jul 5 2006 Dave Jones <davej@redhat.com>
- Get rid of stack backtrace on panic, which in most cases
actually caused a loss of info instead of a gain.
- Tue Jul 4 2006 Juan Quintela <quintela@redhat.com>
- new merge with xen upstream.
- xen kernel don’t require xen userland.
- new xen kernel (same as rawhide one) with PAE support.
- removed xen0-PAE & xenU-PAE (see xen kernel).
- Fri Jun 30 2006 Dave Jones <davej@redhat.com>
- 2.6.17.3
- 2.6.17.2
- Fix the ALSA list_add bug.
- Mon Jun 26 2006 Dave Jones <davej@redhat.com>
- Enable fake PCI hotplug driver. (#190437)
- Enable gameport/joystick on i586 builds. (#196581)
- Sat Jun 24 2006 Dave Jones <davej@redhat.com>
- Enable profiling for 586 kernels.
- Fri Jun 23 2006 Dave Jones <davej@redhat.com>
- Make ‘quiet’ work again.
- Tue Jun 20 2006 Dave Jones <davej@redhat.com>
[2.6.17-1.2139_FC5]
- Rebuild with slab debug off.
- Tue Jun 20 2006 Dave Jones <davej@redhat.com>
[2.6.17-1.2138_FC5]
- 2.6.17.1
- Sun Jun 18 2006 Dave Jones <davej@redhat.com>
- 2.6.17
- Only print info about SMP alternatives on SMP kernels.
- Tue Jun 6 2006 Dave Jones <davej@redhat.com>
[2.6.16-1.2133_FC5]
- Add a PPC64 kdump kernel.
- Mon Jun 5 2006 Dave Jones <davej@redhat.com>
[2.6.16-1.2132_FC5]
- 2.6.16.20
- Thu Jun 1 2006 Dave Jones <davej@redhat.com>
- Reenable Xen builds.
- Tue May 30 2006 Dave Jones <davej@redhat.com>
- 2.6.16.19
- Sun May 28 2006 Dave Jones <davej@redhat.com>
- Fix unresolved symbol. (#193333)
- Sat May 27 2006 Dave Jones <davej@redhat.com>
- Improve list corruption debugging patch.
- Fri May 26 2006 Dave Jones <davej@redhat.com>
- Remove xenU initrd’s when kernel is removed.
- Fri May 26 2006 Juan Quintela <quintela@redhat.com>
- Remove ARCH=xen reminiscences on spec file
This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/
0137f81db84204c0388cc88cc8666615139c2da8
SRPMS/kernel-2.6.19-1.2288.fc5.src.rpm
0137f81db84204c0388cc88cc8666615139c2da8
noarch/kernel-2.6.19-1.2288.fc5.src.rpm
5b3136d7fc38bf4e7e7e0b905978ab28c63cb46c
ppc/debug/kernel-debuginfo-2.6.19-1.2288.fc5.ppc.rpm
4dd2448e7bdcec4e81326991de61abcb321da6e5
ppc/kernel-smp-devel-2.6.19-1.2288.fc5.ppc.rpm
0284e8dd752b2eb606662de569714b908a0f1741
ppc/kernel-2.6.19-1.2288.fc5.ppc.rpm
f5f6809c3bdbc7ab8b3b1776d00588e06d7125b3
ppc/kernel-smp-2.6.19-1.2288.fc5.ppc.rpm
05167f2e3c8922529d12fb4f9358a124edba6ce5
ppc/kernel-devel-2.6.19-1.2288.fc5.ppc.rpm
9c8c130762f2a7080047717abb7274f4119f8798
ppc/kernel-doc-2.6.19-1.2288.fc5.noarch.rpm
66fd9745675018fa8c5f25d9f52872fe44ab41b6
x86_64/kernel-xen0-2.6.19-1.2288.fc5.x86_64.rpm
0a35d53fc80848b0047b106a85c4d84e3d60cba2
x86_64/kernel-kdump-devel-2.6.19-1.2288.fc5.x86_64.rpm
e00632987767092bac7c8d4c10ec87da60e0a165
x86_64/kernel-2.6.19-1.2288.fc5.x86_64.rpm
d00bffe31b7a429e56a11bb9e4ff9c6e801112fa
x86_64/kernel-kdump-2.6.19-1.2288.fc5.x86_64.rpm
0e51d1c94462ccfdc070a9c91e75ce4f6e98d11b
x86_64/kernel-devel-2.6.19-1.2288.fc5.x86_64.rpm
31661722a75e3a3fd5f513b58747c8e42a454d4c
x86_64/kernel-xenU-2.6.19-1.2288.fc5.x86_64.rpm
4e8c3197f857ce1d40a3a23b039e7cc42b19cb4d
x86_64/kernel-xen0-devel-2.6.19-1.2288.fc5.x86_64.rpm
d5d6f808f4bbb5175f4cdaca0677a8d2c94bd14d
x86_64/kernel-xenU-devel-2.6.19-1.2288.fc5.x86_64.rpm
36bbc89f6bf136575b5de33f45241e0ec90d66b3
x86_64/kernel-xen-devel-2.6.19-1.2288.fc5.x86_64.rpm
3aac21a251ff410a1f8a0cbe716e128837899b6f
x86_64/kernel-debug-2.6.19-1.2288.fc5.x86_64.rpm
fe6901212d23d7ecf8e22dbaeedfbf463cae7322
x86_64/kernel-debug-devel-2.6.19-1.2288.fc5.x86_64.rpm
7b2c42e5a4db3d3357c884213ba0275513c55807
x86_64/debug/kernel-debuginfo-2.6.19-1.2288.fc5.x86_64.rpm
94503644c8b0dcb10655752c159e858f179eaf76
x86_64/kernel-xen-2.6.19-1.2288.fc5.x86_64.rpm
9c8c130762f2a7080047717abb7274f4119f8798
x86_64/kernel-doc-2.6.19-1.2288.fc5.noarch.rpm
cb40f9b6952b666ce5f6cb573a337f3f7736794c
i386/debug/kernel-debuginfo-2.6.19-1.2288.fc5.i386.rpm
3d101bb5ab113d00ad1ce96bfeedf5e593f68a30
i386/kernel-smp-2.6.19-1.2288.fc5.i586.rpm
e12113eb3b52af7a1fb8868ded86968830afcfe3
i386/kernel-2.6.19-1.2288.fc5.i586.rpm
7b9631f21f9fd0277cbab143477d8c7d8991c6c1
i386/kernel-devel-2.6.19-1.2288.fc5.i586.rpm
38f477506121b179ba965486c2072545a7897961
i386/kernel-smp-devel-2.6.19-1.2288.fc5.i586.rpm
7d74ce098d0bdc23a9669ca976c3ec464f0e1ec4
i386/debug/kernel-debuginfo-2.6.19-1.2288.fc5.i586.rpm
5a56b41a3175c120c0e55280efe67956bd13830f
i386/kernel-xen0-devel-2.6.19-1.2288.fc5.i686.rpm
eeec6699343fc22b1864ff25335b15cf763a8e18
i386/kernel-smp-debug-2.6.19-1.2288.fc5.i686.rpm
951091984e0efa289bf77188a11dd473e15cc0d4
i386/kernel-xen0-2.6.19-1.2288.fc5.i686.rpm
e9ba0e72826122d2e3182ebf62c633225da71f68
i386/kernel-debug-devel-2.6.19-1.2288.fc5.i686.rpm
1ccfc18da96ca51f8690a7a732809911822bf2d0
i386/kernel-smp-devel-2.6.19-1.2288.fc5.i686.rpm
7133c25a70042423c9263533389c56134eddbd2d
i386/kernel-xen-2.6.19-1.2288.fc5.i686.rpm
49393d8a17ae79e9bc00dcae25a529ee14d73a85
i386/kernel-2.6.19-1.2288.fc5.i686.rpm
2df37544b47c99306ea41b651f1a89c27225af01
i386/kernel-kdump-devel-2.6.19-1.2288.fc5.i686.rpm
b37b4c8cff25ed2cd5de0572e437ff31e4899933
i386/kernel-smp-debug-devel-2.6.19-1.2288.fc5.i686.rpm
54b4cf37db3acbef5f8a9b99fdd0df8097a63d6d
i386/kernel-smp-2.6.19-1.2288.fc5.i686.rpm
6a947d3a63263a01b00afbd17c09713b9235790f
i386/kernel-xenU-devel-2.6.19-1.2288.fc5.i686.rpm
5c524bf0774a144667806b20741415c844a15003
i386/debug/kernel-debuginfo-2.6.19-1.2288.fc5.i686.rpm
8f07ed7ad8dabb3cf13f3f22bffeda1b94cbd04f
i386/kernel-kdump-2.6.19-1.2288.fc5.i686.rpm
4d22a04484402caf09ec7a97cd2a57fd97e3fe01
i386/kernel-devel-2.6.19-1.2288.fc5.i686.rpm
3223cadcc8fb937ca5e0ac1c68f490dab8f56be4
i386/kernel-xenU-2.6.19-1.2288.fc5.i686.rpm
96f5180be11d3922ed081844f2519cf0e5ee7e17
i386/kernel-debug-2.6.19-1.2288.fc5.i686.rpm
84c940efe2f20536463e1d47c8356d32310bd9ed
i386/kernel-xen-devel-2.6.19-1.2288.fc5.i686.rpm
9c8c130762f2a7080047717abb7274f4119f8798
i386/kernel-doc-2.6.19-1.2288.fc5.noarch.rpm
This update can be installed with the ‘yum’ update program. Use
‘yum update package-name’ at the command line. For more
information, refer to ‘Managing Software with yum,’ available at
http://fedora.redhat.com/docs/yum/.
Fedora Update Notification
FEDORA-2007-226
2007-02-13
Product : Fedora Core 6
Name : kernel
Version : 2.6.19
Release : 1.2911.fc6
Summary : The Linux kernel (the core of the Linux operating
system)
Description :
The kernel package contains the Linux kernel (vmlinuz), the core of
any Linux operating system. The kernel handles the basic functions
of the operating system: memory allocation, process allocation,
device input and output, etc.
Update Information:
CVE-2006-0007:
The key serial number collision avoidance code in the
key_alloc_serial function in Linux kernel 2.6.9 up to 2.6.20 allows
remote attackers to cause a denial of service (crash) via vectors
that trigger a null dereference, as originally reported as
“spinlock CPU recursion.”
Update to linux kernel 2.6.19.3:
www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19.3
Bugs fixed:
227802, 226885, 225046, 223431
- Sat Feb 10 2007 Chuck Ebbert <cebbert@redhat.com>
- clean up one “provides”
- add fixes for RHBZ#211672 (CIFS) and RHBZ#227802 (8139too)
- add more NAPI fixes
- Thu Feb 8 2007 Chuck Ebbert <cebbert@redhat.com>
- fix fallout from the 2.6.19.3 update clashing with utrace
- Thu Feb 8 2007 Chuck Ebbert <cebbert@redhat.com>
- fix “provides” for devel packages
- Tue Feb 6 2007 Chuck Ebbert <cebbert@redhat.com>
- disable Tux
- add another GFS2 update
- add crypto key collision patch (CVE-2007-0006)
- Mon Feb 5 2007 Dave Jones <davej@redhat.com>
- Reenable Tux.
- Mon Feb 5 2007 Chuck Ebbert <cebbert@redhat.com>
- 2.6.19.3
- updated mirrors: use ftp ftp2.kernel.org for now
- Sun Feb 4 2007 Dave Jones <davej@redhat.com>
- 2.6.19.3rc1
- Move xen sources out of kernel-xen-devel. (Don Zickus)
- Sat Feb 3 2007 Dave Jones <davej@redhat.com>
- Remove kdump config options from non-kdump configs. This will
fix the ‘reboots as soon as booting up’ bug.
- Thu Feb 1 2007 Chuck Ebbert <cebbert@redhat.com>
- Added i586 AES and Blowfish modules to i686 config
- Wed Jan 31 2007 Markus Armbruster
<armbru@redhat.com>
- Xenoprof for intel core (#215519).
- Fix iSCSI root oops on x86_64 xen domU.
- Tue Jan 30 2007 Chuck Ebbert <cebbert@redhat.com>
- Minor config file changes
- Mon Jan 29 2007 Dave Jones <davej@redhat.com>
- Fix attr2 corruption with btree data extents
- Tue Jan 23 2007 Juan Quintela <quintela@redhat.com>
- update xen kernel patch
- pvfb is now included in it.
- changeset: 43493:67d20a7ca5f9
- update to kernel 2.6.19.2.
- Mon Jan 15 2007 Markus Armbruster <armbru@redhat.com>
- Update Xen paravirt framebuffer patch to upstream xen-unstable
changeset 13066, less changeset 12680, because that breaks with
console=tty console=xvc. Also change default domU console back to
/dev/xcv0. This changes the protocol to the one accepted
upstream. - Add compatibility with guests running our initial
protocol. - Update Xen console major/minor to lanana.org-assigned
numbers.
- Update Xen paravirt framebuffer patch to upstream xen-unstable
This update can be downloaded from: