---

Advisories, February 14, 2007

Debian GNU/Linux


Debian Security Advisory DSA 1259-1 security@debian.org
http://www.debian.org/security/
Moritz Muehlenhoff
February 14th, 2007 http://www.debian.org/security/faq


Package : fetchmail
Vulnerability : programming error
Problem-Type : remote
Debian-specific: no
CVE ID : CVE-2006-5867

Isaac Wilcox discovered that fetchmail, a popular mail retrieval
and forwarding utility, insufficiently enforces encryption of
connections, which might lead to information disclosure.

For the stable distribution (sarge) this problem has been fixed
in version 6.2.5-12sarge5.

For the upcoming stable distribution (etch) this problem has
been fixed in version 6.3.6~rc5-1.

For the unstable distribution (sid) this problem has been fixed
in version 6.3.6~rc5-1.

We recommend that you upgrade your fetchmail package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5.dsc

      Size/MD5 checksum: 650
6f33289df330ad5d6b73a970a131717d
    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5.diff.gz

      Size/MD5 checksum: 155433
092b1d26d52b001b85b5afb66936fe90
    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5.orig.tar.gz

      Size/MD5 checksum: 1257376
9956b30139edaa4f5f77c4d0dbd80225

Architecture independent components:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail-ssl_6.2.5-12sarge5_all.deb

      Size/MD5 checksum: 42390
da1c1f925e68bf2385b071648db81f66
    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmailconf_6.2.5-12sarge5_all.deb

      Size/MD5 checksum: 101492
2afde54d68ae7174551613028c91403d

Alpha architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_alpha.deb

      Size/MD5 checksum: 573554
69b08d3a3471630a9a844da3cf2389c9

AMD64 architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_amd64.deb

      Size/MD5 checksum: 556356
2411990fef9d0a6a9ee41db1c33afad2

ARM architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_arm.deb

      Size/MD5 checksum: 549686
5daedcf04842d2e5b540e88f70235ff4

HP Precision architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_hppa.deb

      Size/MD5 checksum: 562170
b0ef556bf0a065dd545b1381394d32c3

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_i386.deb

      Size/MD5 checksum: 548738
6fc67ff75514e65d15c1ccd78f471046

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_ia64.deb

      Size/MD5 checksum: 597726
4d3cb4897d0c4b410962a7694c711647

Motorola 680×0 architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_m68k.deb

      Size/MD5 checksum: 538548
84679550a984c949b8869d4b385fa815

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_mips.deb

      Size/MD5 checksum: 557342
916d92cfc83e97bccd112408b78261cb

Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_mipsel.deb

      Size/MD5 checksum: 557230
566a25f4fa247d9d1cebc37a3daee6c7

PowerPC architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_powerpc.deb

      Size/MD5 checksum: 556706
0ac0f73bbe90d13bf73b054da7187da2

IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_s390.deb

      Size/MD5 checksum: 555180
fd69f70a49c73046cd1c265e3b1fd80d

Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_sparc.deb

      Size/MD5 checksum: 549578
28ca03faddd6b6ff3958243012e681a4

These files will probably be moved into the stable distribution
on its next update.



Debian Security Advisory DSA 1260-1 security@debian.org
http://www.debian.org/security/
Moritz Muehlenhoff
February 14th, 2007 http://www.debian.org/security/faq


Package : imagemagick
Vulnerability : buffer overflow
Problem-Type : local(remote)
Debian-specific: no
CVE ID : CVE-2007-0770

Vladimir Nadvornik discovered that the fix for a vulnerability
in the PALM decoder of Imagemagick, a collection of image
manipulation programs, was ineffective. To avoid confusion a new
CVE ID has been assigned; tha original issue was tracked as
CVE-2006-5456.

For the stable distribution (sarge) this problem has been fixed
in version 6:6.0.6.2-2.9.

For the upcoming stable distribution (etch) this problem has
been fixed in version 7:6.2.4.5.dfsg1-0.14.

For the unstable distribution (sid) this problems has been fixed
in version 7:6.2.4.5.dfsg1-0.14.

We recommend that you upgrade your imagemagick packages.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9.dsc

      Size/MD5 checksum: 881
7a9c72b09064a000b21fb7f1c188f58b
    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9.diff.gz

      Size/MD5 checksum: 142091
882c6b166d02a3afcf7b65b935053141
    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2.orig.tar.gz

      Size/MD5 checksum: 6824001
477a361ba0154cc2423726fab4a3f57c

Alpha architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_alpha.deb

      Size/MD5 checksum: 1473132
a64722b75a6727372eab8c5a8e9d3460
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_alpha.deb

      Size/MD5 checksum: 173936
73ad6aba77ddd80a1fa1bf9cb6838a6a
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_alpha.deb

      Size/MD5 checksum: 288822
6a29717cdc16bc5f7dc3527b3c04a32e
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_alpha.deb

      Size/MD5 checksum: 1284370
7fe43e1953d01bfd1f40e743b43828e5
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_alpha.deb

      Size/MD5 checksum: 2200348
183f4d885fb0f0aa298f80ae689eb068
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_alpha.deb

      Size/MD5 checksum: 234798
1e536b98cce30203535a21a110effc66

AMD64 architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_amd64.deb

      Size/MD5 checksum: 1466442
cce61a586a2c5456e5cd9998f503dff1
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_amd64.deb

      Size/MD5 checksum: 163710
f0c6e48b31063d20aad8d6801f7b01dd
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_amd64.deb

      Size/MD5 checksum: 228834
c0e8f73804537f75df7260ff692e0cb6
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_amd64.deb

      Size/MD5 checksum: 1195150
0162e13544100058faee672fd672bcfd
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_amd64.deb

      Size/MD5 checksum: 1550468
07ae791a2fbccd31ea48bb425552308f
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_amd64.deb

      Size/MD5 checksum: 231912
ffe6aa0bc71cb5b1f367864fd94c9c0c

ARM architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_arm.deb

      Size/MD5 checksum: 1466166
7a8b57092ad8fcb15ff9ac69e94f79a6
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_arm.deb

      Size/MD5 checksum: 149436
f60d0449d25c294c8a9e5b111ee0dd73
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_arm.deb

      Size/MD5 checksum: 234946
fc0b7d343929740700a12af92014f7b7
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_arm.deb

      Size/MD5 checksum: 1204686
888ae3ff5955c8d4ba9635d2b0333357
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_arm.deb

      Size/MD5 checksum: 1647748
b0ebfaba0393ad3d17cc08417e16f4f6
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_arm.deb

      Size/MD5 checksum: 230598
febfdf6b1e489ce6e9c5c195eea4d099

HP Precision architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_hppa.deb

      Size/MD5 checksum: 1468434
91af04f67f24aa210f9751b23b44f1a0
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_hppa.deb

      Size/MD5 checksum: 182294
22ff85bb71aa67ec2dfd07c08698a95e
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_hppa.deb

      Size/MD5 checksum: 274036
2832f545f069276518a6cd91658ab495
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_hppa.deb

      Size/MD5 checksum: 1404890
80a6f5944d0be3209f1fdeed9de3c1ae
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_hppa.deb

      Size/MD5 checksum: 1827916
94b36feb9f8fcb3b9262d9725652e5cf
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_hppa.deb

      Size/MD5 checksum: 243918
8bbc8f0b106e7fc8160801f5e9ed4c6f

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_i386.deb

      Size/MD5 checksum: 1466158
b12fb2db8d713c7d09609ce761ce511f
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_i386.deb

      Size/MD5 checksum: 164504
12ffd60f5fc6c51a85016a1ebdc75d53
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_i386.deb

      Size/MD5 checksum: 209010
9aeebaf3983a8bdaad0bb762609054ed
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_i386.deb

      Size/MD5 checksum: 1172338
58922d27e7184a30fcdf5de44ddf9e7c
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_i386.deb

      Size/MD5 checksum: 1507592
8b8d72379bacb85839b4bbf7f2d4a1b4
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_i386.deb

      Size/MD5 checksum: 234080
7ef93e742172c9a342acc2a913b65520

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_ia64.deb

      Size/MD5 checksum: 1468502
0a7887202d57741c8c3be4b2dce958e2
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_ia64.deb

      Size/MD5 checksum: 188402
3ade807b07759f05c264885efb99419e
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_ia64.deb

      Size/MD5 checksum: 296008
82f76c8876488eca4f4818abb3d5edb4
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_ia64.deb

      Size/MD5 checksum: 1605664
ebf2610607abc6410b09dc239c382c90
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_ia64.deb

      Size/MD5 checksum: 2132678
5fd5d6101764eb020ae46945e52a11ed
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_ia64.deb

      Size/MD5 checksum: 273596
a13f4b344a84d94fa360162225b93c10

Motorola 680×0 architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_m68k.deb

      Size/MD5 checksum: 1466216
6b3c7f12eb188ac46fc20fd1ffa9dfa8
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_m68k.deb

      Size/MD5 checksum: 160146
b466183701680d1216ca13823170430d
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_m68k.deb

      Size/MD5 checksum: 210812
dc5096668fe53c84e1675f7ae361f94b
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_m68k.deb

      Size/MD5 checksum: 1073380
f5a339d2de04dc2f7de490de29ca2f4c
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_m68k.deb

      Size/MD5 checksum: 1288946
33ca416bee60fa710c8efe906ad58a60
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_m68k.deb

      Size/MD5 checksum: 227038
017265076e92de6c95130780e7ca9dcd

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_mips.deb

      Size/MD5 checksum: 1490302
79e518fceb087b30d2a1c14bd60b8691
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_mips.deb

      Size/MD5 checksum: 155602
f77792a9077082ff893900446d286be4
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_mips.deb

      Size/MD5 checksum: 254920
8fb4d82e2f40d41c7eb7418b0f43a3d1
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_mips.deb

      Size/MD5 checksum: 1119298
0458271acc8b9925db07ad48e184f058
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_mips.deb

      Size/MD5 checksum: 1704528
30f1e7b3b9fa83719e9b3952c6c502a7
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_mips.deb

      Size/MD5 checksum: 131418
3e77636bb19daed6ed119a627b0ce504

Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_mipsel.deb

      Size/MD5 checksum: 1490274
8baafda5b96b876517b06eafacbf895b
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_mipsel.deb

      Size/MD5 checksum: 151714
09ef6d0f126ca139d69289799d7fb895
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_mipsel.deb

      Size/MD5 checksum: 250164
b65ca0ed3b5f040f5d78a5fbdb1d5563
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_mipsel.deb

      Size/MD5 checksum: 1114890
6c47dc9a27e98b670e31e5a6aa8e6daf
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_mipsel.deb

      Size/MD5 checksum: 1668004
469c0f05098b4a8ec6a265632ba950bd
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_mipsel.deb

      Size/MD5 checksum: 131020
4fb92c9bb3f4d4f5caaa039b646aa9af

PowerPC architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_powerpc.deb

      Size/MD5 checksum: 1471882
8d3e9a8bf55a29112ef3cdf6bf9e12e9
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_powerpc.deb

      Size/MD5 checksum: 156866
d1ee7717bade0bf2cfd1286ec8f9dae8
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_powerpc.deb

      Size/MD5 checksum: 227822
43e65023fad784aca3c2061703f4dbb8
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_powerpc.deb

      Size/MD5 checksum: 1169594
e428dda6c063b60ed3f90ba25aaf5194
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_powerpc.deb

      Size/MD5 checksum: 1684924
03e88e7f8158add8558bb4cfc0b413eb
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_powerpc.deb

      Size/MD5 checksum: 270638
27a8eaacfee84ee0103bd58f817f8cbb

IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_s390.deb

      Size/MD5 checksum: 1467688
e30f5f259bbfb5855468c4ca165eb311
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_s390.deb

      Size/MD5 checksum: 180574
bd3a78a00b618c09182631011cca8455
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_s390.deb

      Size/MD5 checksum: 230292
0e052ebfd74856a77ec7815567b581bd
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_s390.deb

      Size/MD5 checksum: 1194348
558ea25312ff8ec8a39001f87f4c2f2d
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_s390.deb

      Size/MD5 checksum: 1531000
a11c3e26b1d6cb2110a1eb454874b990
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_s390.deb

      Size/MD5 checksum: 242192
7180ca4868abbead48a65de84d74caf9

Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_sparc.deb

      Size/MD5 checksum: 1465752
1b7a5126b7ab981ba3cb2ba840405ecb
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_sparc.deb

      Size/MD5 checksum: 161160
fe14a3bf7df9231eef3931dffa190882
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_sparc.deb

      Size/MD5 checksum: 224424
b12e563f9c3f33fe4599cb3343387477
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_sparc.deb

      Size/MD5 checksum: 1249364
9fc7b5dbfd4a964443cead1d34bf1649
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_sparc.deb

      Size/MD5 checksum: 1684558
4ca62128d73a9bf8a1b8c680195da801
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_sparc.deb

      Size/MD5 checksum: 231044
3a630dd561970f121708553c6262e1d9

These files will probably be moved into the stable distribution
on its next update.


For apt-get: deb http://security.debian.org/
stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

Package info: `apt-cache show <pkg>’ and http://packages.debian.org/<pkg>

Fedora Core


Fedora Update Notification
FEDORA-2007-225
2007-02-13


Product : Fedora Core 5
Name : kernel
Version : 2.6.19
Release : 1.2288.fc5
Summary : The Linux kernel (the core of the Linux operating
system)

Description :
The kernel package contains the Linux kernel (vmlinuz), the core of
any Linux operating system. The kernel handles the basic functions
of the operating system: memory allocation, process allocation,
device input and output, etc.


Update Information:

CVE-2006-0007:
The key serial number collision avoidance code in the
key_alloc_serial function in Linux kernel 2.6.9 up to 2.6.20 allows
remote attackers to cause a denial of service (crash) via vectors
that trigger a null dereference, as originally reported as
“spinlock CPU recursion.”

Major rebase to upstream linux kernel 2.6.19.3:
www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19

www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19.1

www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19.2

www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19.3

This update also introduces ‘kernel-debug’, a variant with
additional debugging options enabled. These kernels may run with
lower performance and increased memory overhead than the non-debug
variants.

Bugs fixed:
214495, 211672


  • Sat Feb 10 2007 Chuck Ebbert <cebbert@redhat.com>
  • add missing “provides” for debug-devel packages
  • clean up some other “provides” things
  • add fixes for RHBZ#211672 (CIFS) and RHBZ#227802 (8139too)
  • Wed Feb 7 2007 Chuck Ebbert <cebbert@redhat.com>
  • add missing debug-devel and smp-debug-devel sections
  • Wed Feb 7 2007 Chuck Ebbert <cebbert@redhat.com>
  • fix up x86_64 Xen build
  • Tue Feb 6 2007 Chuck Ebbert <cebbert@redhat.com>
  • disable Tux
  • add another GFS2 update
  • add crypto key collision patch (CVE-2007-0006)
  • Mon Feb 5 2007 Dave Jones <davej@redhat.com>
  • Reenable Tux.
  • Mon Feb 5 2007 Chuck Ebbert <cebbert@redhat.com>
  • 2.6.19.3
  • updated mirrors: refer to ftp ftp2.kernel.org until kernel.org
    problems are fixed
  • Sun Feb 4 2007 Dave Jones <davej@redhat.com>
  • 2.6.19.3rc1
  • Sat Feb 3 2007 Dave Jones <davej@redhat.com>
  • Disable kdump options in non-kdump kernels.
  • Thu Feb 1 2007 Chuck Ebbert <cebbert@redhat.com>
  • Added i586 optimized AES and Blowfish modules to the i686
    config
  • Fixed .cvsignore
  • Wed Jan 31 2007 Markus Armbruster
    <armbru@redhat.com>
  • The previous cset folded the Xen paravirt framebuffer patch
    into linux-2.6-xen.patch, and commented out the obsoleted patch
    files. Remove them.
  • Wed Jan 31 2007 Chuck Ebbert <cebbert@redhat.com>
  • Update to 2.6.19.2
  • Tue Jan 30 2007 Markus Armbruster
    <armbru@redhat.com>
  • Update Xen paravirt framebuffer patch to upstream xen-unstable
    changeset 13066, less changeset 12680, because that breaks with
    console=tty console=xvc. Also change default domU console back to
    /dev/xcv0. This changes the protocol to the one accepted
    upstream.
  • Add compatibility with guests running our initial
    protocol.
  • Update Xen console major/minor to lanana.org-assigned
    numbers.
  • Wed Dec 20 2006 Dave Jones <davej@redhat.com>
  • Update to 2.6.18.6 final (no changes since rc2)
  • Reenable squashfs (#220293)
  • Fri Dec 15 2006 Dave Jones <davej@redhat.com>
  • 2.6.18.6rc2
  • Wed Dec 13 2006 Dave Jones <davej@redhat.com>
  • squashfs robustness fixes from Phillip Lougher.
  • lower max CPU count for x86-64 to 64 CPUs.
  • Thu Dec 7 2006 Juan Quintela <quintela@redhat.com>
  • update xen to 2.6.18.5.
  • Fix bug 211986 on xen eventchn (Glaubert).
  • Tue Dec 5 2006 Dave Jones <davej@redhat.com>
  • 2.6.18.5
  • Disable auto-apic patch, it needs more thought.
  • Enable sonypi driver for 586 kernels. (#218434)
  • Tue Nov 21 2006 Juan Quintela <quintela@redhat.com>
  • Update xen to 2.6.18.3.
  • linux-2.6.18-xen changeset: 36186:053cdad40903
  • xen-3.0.3-testing changeset: 11774:52ae8dd4bc75
  • linux-2.6-xen-3.0.3 changeset: 22949:4281f5246814
  • Mon Nov 20 2006 Dave Jones <davej@redhat.com>
  • 2.6.18.3
  • Fix CIFS mount failure when domain not specified (#211753)
  • Avoid null pointer dereference in SATA Promise. (#199142)
  • Fri Nov 17 2006 Dave Jones <davej@redhat.com>
  • Fix up fallout from disabling utrace.
  • Fri Nov 17 2006 Juan Quintela <quintela@redhat.com>
  • merge xen missing bits from FC6 kernel.
  • Thu Nov 16 2006 Dave Jones <davej@redhat.com>
  • Fix up error handling in HFS. (MOKB-14-11-2006)
  • Thu Nov 16 2006 Juan Quintela <quintela@redhat.com>
  • Update xen HV to 3.0.3_0 (cset 11774).
  • Update xen kernel patch to 3.0.3_0:
  • linux-2.6.18-xen changeset: 36182:c6ef4b521aef
  • xen-3.0.3-testing changeset: 11774:52ae8dd4bc75
  • linux-2.6-xen-3.0.3 changeset: 22949:4281f5246814
  • Thu Nov 16 2006 Dave Jones <davej@redhat.com>
  • Fix squashfs corruption bug. (#211237)
  • Drop experimental utrace from FC5.
  • Fri Nov 10 2006 Juan Quintela <quintela@redhat.com>
  • disable XEN_FRAMEBUFFER & XEN_KEYBOARD.
  • Fri Nov 10 2006 Dave Jones <davej@redhat.com>
  • Xen grant table operations security fix.
  • Disable W1 (#195825)
  • Thu Nov 9 2006 Dave Jones <davej@redhat.com>
  • Change HZ to 1000 for increased accuracy. (Except in Xen, where
    it stays at 250 for now).
  • TTY locking fixes.
  • splice : Must fully check for FIFO
  • Fix potential NULL dereference in sys_move_pages
  • ISO9660 __find_get_block_slow() denial of service
    CVE-2006-5757
  • Fix up oops in cramfs when encountering corrupt images.
  • E1000 suspend/resume fixes.
  • Set CIFS preferred IO size. (#214607)
  • Mon Nov 6 2006 Roland McGrath <roland@redhat.com>
  • New utrace patch: fix locking snafu crash on second engine
    attach.
  • Sun Nov 5 2006 Dave Jones <davej@redhat.com>
  • Suspend/Resume fixes for forcedeth. (#187653)
  • Sat Nov 4 2006 Dave Jones <davej@redhat.com>
  • 2.6.18.2
  • Thu Nov 2 2006 Dave Jones <davej@redhat.com>
  • Nuke broken lazy execshield xen patch.
  • Use heuristics to determine whether to enable lapic on
    i386.
  • Wed Nov 1 2006 Dave Jones <davej@redhat.com>
  • 2.6.18.2-rc1
  • Tue Oct 31 2006 Dave Jones <davej@redhat.com>
  • Fix UFS mounts on x86-64 (#209921)
  • Fix problem where USB storage isn’t seen on reboot.
    (#212191)
  • Sun Oct 29 2006 Dave Jones <davej@redhat.com>
  • More ext3 robustness fixes.
  • Include more verbose BUG() data
  • x86_64: Fix up C3 timer latency.
  • Sat Oct 21 2006 Dave Jones <davej@redhat.com>
  • Reenable NCPFS (#211325, #203663)
  • Netpoll fixes. (#199295)
  • Fri Oct 20 2006 Dave Jones <davej@redhat.com>
  • Fix autofs creating bad dentries in NFS mount. (#211206,
    #211207)
  • Fix softlockup with ips driver. (#196437)
  • Further exec-shield improvements.
  • Fix lockup with sky2 driver. (#202203)
  • Thu Oct 19 2006 Dave Jones <davej@redhat.com>
  • Export copy_4K_page for ppc64 (#211410)
  • Attempt to fix CIFS bug (#211070)
  • Wed Oct 18 2006 Dave Jones <davej@redhat.com>
  • Fix up aic7xxx SBLKCTL register handling (#211251)
  • Disable SECMARK by default. (#211115)
  • Disable some extra debugging stuff that crept in.
  • Remove broken VIA quirk that prevented booting on some EPIAs
    (#211298)
  • Tue Oct 17 2006 Dave Jones <davej@redhat.com>
  • Silence noisy boot-time messages. (#180606)
  • Workaround gcc bug with weak symbols (#191458)
  • Don’t let speedstep-smi register on mobile Pentium4
    (#204477)
  • Sat Oct 14 2006 Dave Jones <davej@redhat.com>
  • Fix jbd crash with 1KB block size filesystems.
  • Sat Oct 14 2006 Dave Jones <davej@redhat.com>
    [2.6.18-1.2200.fc5]
  • 2.6.18.1
  • Tue Oct 10 2006 Dave Jones <davej@redhat.com>
  • DWARF2 unwinder fixes.
  • Various lockdep fixes.
  • Sync various other patches from the FC6 kernel.
  • Sun Oct 1 2006 Dave Jones <davej@redhat.com>
  • Drop the STICKY tag from acpi-cpufreq, it breaks
    suspend/resume.
  • Fri Sep 29 2006 Dave Jones <davej@redhat.com>
  • Execshield improvements. (Bart Oldeman)
  • Disable PM_DEBUG
  • Thu Sep 28 2006 Roland McGrath <roland@redhat.com>
  • utrace typo fix for x86-64 watchpoints (#207467)
  • Thu Sep 28 2006 Dave Jones <davej@redhat.com>
  • Fix ISAPNP messages on ppc32. (#207641)
  • Thu Sep 28 2006 Dave Jones <davej@redhat.com>
  • Another day, another round of lockdep fixes.
  • Align kernel data segment to page boundary. (#206863)
  • Thu Sep 28 2006 Steven Whitehouse
    <swhiteho@redhat.com>
  • New GFS2 patch
  • Thu Sep 28 2006 Dave Jones <davej@redhat.com>
  • Fix “kernel BUG at fs/buffer.c:2789!” bug
  • Wed Sep 27 2006 Dave Jones <davej@redhat.com>
  • yet more lockdep fixes.
  • Fix a problem with XFS & the inode diet patches.
  • Fix rpc_pipefs umount oops
  • Enable alternative TCP congestion algorithms.
  • Tue Sep 26 2006 Dave Jones <davej@redhat.com>
  • Enable serverworks IDE driver for x86-64.
  • More lockdep fixes.
  • Mon Sep 25 2006 Jarod Wilson <
  • Make kernel packages own initrd files
  • Mon Sep 25 2006 John W. Linville
    <linville@redhat.com>
  • Add periodic work fix for bcm43xx driver
  • Sat Sep 23 2006 Dave Jones <davej@redhat.com>
  • Disable dgrs driver.
  • Thu Sep 21 2006 Dave Jones <davej@redhat.com>
  • reiserfs: make sure all dentry refs are released before calling
    kill_block_super
  • Fix up some compile warnings
  • Thu Sep 21 2006 Juan Quintela <quintela@redhat.com>
  • re-enable xen.
  • update xen:
  • linux-2.6 changeset: 34294:dc1d277d06e0
  • linux-2.6-xen-fedora changeset: 36184:47c098fdce14
  • xen-unstable changeset: 11540:9837ff37e354
  • update xen HV to changeset: 11540:9837ff37e354
  • xen HV printf rate limit (rostedt).
  • Wed Sep 20 2006 Dave Jones <davej@redhat.com>
  • 2.6.18
  • i965 AGP suspend support.
  • AGP x8 fixes.
  • Tue Sep 19 2006 Juan Quintela <quintela@redhat.com>
  • updated xen configs to sync with rawhide ones (don’t be afraid,
    xen0/xenU still around).
  • xen update.
  • linux-2.6 changeset: 34228:ea3369ba1e2c
  • linux-2.6-xen-fedora changeset: 36109:eefcfd07d102
  • linux-2.6-xen changeset: 22905:d8ae02f7df05
  • xen-unstable changeset:
    11460:1ece34466781ec55f41fd29d53f6dafd208ba2fa
  • Mon Sep 18 2006 Dave Jones <davej@redhat.com>
  • Bring back 586smp
  • Fix RTC lockdep bug. (Peter Zijlstra)
  • Mon Sep 18 2006 Juan Quintela <quintela@redhat.com>
  • xen HV update (cset 11470:2b8dc69744e3).
  • Sun Sep 17 2006 Juan Quintela <quintela@redhat.com>
  • xen update:
  • linux-2.6 changeset: 34228:ea3369ba1e2c
  • linux-2.6-xen-fedora changeset: 36107:47256dbb1583
  • linux-2.6-xen changeset: 22905:d8ae02f7df05
  • xen-unstable changeset:
    11460:1ece34466781ec55f41fd29d53f6dafd208ba2fa
  • Sun Sep 17 2006 Dave Jones <davej@redhat.com>
  • Rebase to 2.6.18rc7-git2
  • Mon Sep 11 2006 Dave Jones <davej@redhat.com>
    [2.6.17-1.2187_FC5]
  • Add quirk for Samsung mp3 player. (#198128)
  • Sun Sep 10 2006 Dave Jones <davej@redhat.com>
  • Fix up mismerge in USB storage driver.
  • Sat Sep 9 2006 Dave Jones <davej@redhat.com>
  • 2.6.17.13
  • Fri Sep 8 2006 Dave Jones <davej@redhat.com>
  • 2.6.17.12
  • Thu Aug 24 2006 Jarod Wilson <
  • update to 2.6.17.11
  • Tue Aug 22 2006 Bill Nottingham <
  • update to 2.6.17.10«
  • Tue Aug 15 2006 Juan Quintela <quintela@redhat.com>
  • linux-2.6-xen update
  • linux-2.6.17-xen cset changeset: 29033:e6adb54afb96
  • linux-2.6-xen cset 22813:80c2ccf5c330
  • s/xen_version/xen_hv_cset/ as Fedora.
  • update xen hv to cset 11061.
  • Mon Aug 7 2006 Mike Christie <mchristi@redhat.com>
  • Drop iscsi update patch.
  • Mon Aug 7 2006 Dave Jones <davej@redhat.com>
  • 2.6.17.8
  • Fri Aug 4 2006 Dave Jones <davej@redhat.com>
v- Fix split lock patch for 64bit.
  • Fri Aug 4 2006 Dave Jones <davej@redhat.com>
    [2.6.17-1.2171_FC5]
  • 2.6.17.8rc1
  • Wed Aug 2 2006 Dave Jones <davej@redhat.com>
  • Readd patch to allow 460800 baud on 16C950 UARTs
  • Sat Jul 29 2006 Dave Jones <davej@redhat.com>
  • Silence noisy SCSI ioctl. (#200638)
  • Fri Jul 28 2006 Dave Jones <davej@redhat.com>
  • 2.6.17.7
  • Thu Jul 27 2006 Rik van Riel <riel@redhat.com>
  • reduce hypervisor stack use with -O2, this really fixes bug
    (#198932)
  • Tue Jul 25 2006 Rik van Riel <riel@redhat.com>
  • disable debug=y hypervisor build option because of stack
    overflow (#198932)
  • Tue Jul 25 2006 Dave Jones <davej@redhat.com>
  • Enable serio_raw (#199387)
  • Sun Jul 16 2006 Dave Jones <davej@redhat.com>
  • Support up to 4GB in the 586 kernel again.
  • Sun Jul 16 2006 Dave Jones <davej@redhat.com>
  • 2.6.17.6
  • Fri Jul 14 2006 Dave Jones <davej@redhat.com>
  • Reenable SMC NIC driver.
  • Tue Jul 11 2006 Dave Jones <davej@redhat.com>
  • 2.6.17.4
  • Disable split pagetable lock
  • Sat Jul 8 2006 Juan Quintela <quintela@redhat.com>
  • enable CONFIG_CRASH on xen kernels.
  • enable CONFIG_PCIDEV_BACKEND on xen kernels.
  • make BLKDEV_FRONTEND a module on xen kernels.
  • rebase with linux-2.6-xen-fedora 28918.
  • Update to xen-unstable HV cset 10508.
  • xen: credit scheduler is the default now.
  • Wed Jul 5 2006 Dave Jones <davej@redhat.com>
  • Get rid of stack backtrace on panic, which in most cases
    actually caused a loss of info instead of a gain.
  • Tue Jul 4 2006 Juan Quintela <quintela@redhat.com>
  • new merge with xen upstream.
  • xen kernel don’t require xen userland.
  • new xen kernel (same as rawhide one) with PAE support.
  • removed xen0-PAE & xenU-PAE (see xen kernel).
  • Fri Jun 30 2006 Dave Jones <davej@redhat.com>
  • 2.6.17.3
  • 2.6.17.2
  • Fix the ALSA list_add bug.
  • Mon Jun 26 2006 Dave Jones <davej@redhat.com>
  • Enable fake PCI hotplug driver. (#190437)
  • Enable gameport/joystick on i586 builds. (#196581)
  • Sat Jun 24 2006 Dave Jones <davej@redhat.com>
  • Enable profiling for 586 kernels.
  • Fri Jun 23 2006 Dave Jones <davej@redhat.com>
  • Make ‘quiet’ work again.
  • Tue Jun 20 2006 Dave Jones <davej@redhat.com>
    [2.6.17-1.2139_FC5]
  • Rebuild with slab debug off.
  • Tue Jun 20 2006 Dave Jones <davej@redhat.com>
    [2.6.17-1.2138_FC5]
  • 2.6.17.1
  • Sun Jun 18 2006 Dave Jones <davej@redhat.com>
  • 2.6.17
  • Only print info about SMP alternatives on SMP kernels.
  • Tue Jun 6 2006 Dave Jones <davej@redhat.com>
    [2.6.16-1.2133_FC5]
  • Add a PPC64 kdump kernel.
  • Mon Jun 5 2006 Dave Jones <davej@redhat.com>
    [2.6.16-1.2132_FC5]
  • 2.6.16.20
  • Thu Jun 1 2006 Dave Jones <davej@redhat.com>
  • Reenable Xen builds.
  • Tue May 30 2006 Dave Jones <davej@redhat.com>
  • 2.6.16.19
  • Sun May 28 2006 Dave Jones <davej@redhat.com>
  • Fix unresolved symbol. (#193333)
  • Sat May 27 2006 Dave Jones <davej@redhat.com>
  • Improve list corruption debugging patch.
  • Fri May 26 2006 Dave Jones <davej@redhat.com>
  • Remove xenU initrd’s when kernel is removed.
  • Fri May 26 2006 Juan Quintela <quintela@redhat.com>
  • Remove ARCH=xen reminiscences on spec file

This update can be downloaded from:

    http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/

0137f81db84204c0388cc88cc8666615139c2da8
SRPMS/kernel-2.6.19-1.2288.fc5.src.rpm
0137f81db84204c0388cc88cc8666615139c2da8
noarch/kernel-2.6.19-1.2288.fc5.src.rpm
5b3136d7fc38bf4e7e7e0b905978ab28c63cb46c
ppc/debug/kernel-debuginfo-2.6.19-1.2288.fc5.ppc.rpm
4dd2448e7bdcec4e81326991de61abcb321da6e5
ppc/kernel-smp-devel-2.6.19-1.2288.fc5.ppc.rpm
0284e8dd752b2eb606662de569714b908a0f1741
ppc/kernel-2.6.19-1.2288.fc5.ppc.rpm
f5f6809c3bdbc7ab8b3b1776d00588e06d7125b3
ppc/kernel-smp-2.6.19-1.2288.fc5.ppc.rpm
05167f2e3c8922529d12fb4f9358a124edba6ce5
ppc/kernel-devel-2.6.19-1.2288.fc5.ppc.rpm
9c8c130762f2a7080047717abb7274f4119f8798
ppc/kernel-doc-2.6.19-1.2288.fc5.noarch.rpm
66fd9745675018fa8c5f25d9f52872fe44ab41b6
x86_64/kernel-xen0-2.6.19-1.2288.fc5.x86_64.rpm
0a35d53fc80848b0047b106a85c4d84e3d60cba2
x86_64/kernel-kdump-devel-2.6.19-1.2288.fc5.x86_64.rpm
e00632987767092bac7c8d4c10ec87da60e0a165
x86_64/kernel-2.6.19-1.2288.fc5.x86_64.rpm
d00bffe31b7a429e56a11bb9e4ff9c6e801112fa
x86_64/kernel-kdump-2.6.19-1.2288.fc5.x86_64.rpm
0e51d1c94462ccfdc070a9c91e75ce4f6e98d11b
x86_64/kernel-devel-2.6.19-1.2288.fc5.x86_64.rpm
31661722a75e3a3fd5f513b58747c8e42a454d4c
x86_64/kernel-xenU-2.6.19-1.2288.fc5.x86_64.rpm
4e8c3197f857ce1d40a3a23b039e7cc42b19cb4d
x86_64/kernel-xen0-devel-2.6.19-1.2288.fc5.x86_64.rpm
d5d6f808f4bbb5175f4cdaca0677a8d2c94bd14d
x86_64/kernel-xenU-devel-2.6.19-1.2288.fc5.x86_64.rpm
36bbc89f6bf136575b5de33f45241e0ec90d66b3
x86_64/kernel-xen-devel-2.6.19-1.2288.fc5.x86_64.rpm
3aac21a251ff410a1f8a0cbe716e128837899b6f
x86_64/kernel-debug-2.6.19-1.2288.fc5.x86_64.rpm
fe6901212d23d7ecf8e22dbaeedfbf463cae7322
x86_64/kernel-debug-devel-2.6.19-1.2288.fc5.x86_64.rpm
7b2c42e5a4db3d3357c884213ba0275513c55807
x86_64/debug/kernel-debuginfo-2.6.19-1.2288.fc5.x86_64.rpm
94503644c8b0dcb10655752c159e858f179eaf76
x86_64/kernel-xen-2.6.19-1.2288.fc5.x86_64.rpm
9c8c130762f2a7080047717abb7274f4119f8798
x86_64/kernel-doc-2.6.19-1.2288.fc5.noarch.rpm
cb40f9b6952b666ce5f6cb573a337f3f7736794c
i386/debug/kernel-debuginfo-2.6.19-1.2288.fc5.i386.rpm
3d101bb5ab113d00ad1ce96bfeedf5e593f68a30
i386/kernel-smp-2.6.19-1.2288.fc5.i586.rpm
e12113eb3b52af7a1fb8868ded86968830afcfe3
i386/kernel-2.6.19-1.2288.fc5.i586.rpm
7b9631f21f9fd0277cbab143477d8c7d8991c6c1
i386/kernel-devel-2.6.19-1.2288.fc5.i586.rpm
38f477506121b179ba965486c2072545a7897961
i386/kernel-smp-devel-2.6.19-1.2288.fc5.i586.rpm
7d74ce098d0bdc23a9669ca976c3ec464f0e1ec4
i386/debug/kernel-debuginfo-2.6.19-1.2288.fc5.i586.rpm
5a56b41a3175c120c0e55280efe67956bd13830f
i386/kernel-xen0-devel-2.6.19-1.2288.fc5.i686.rpm
eeec6699343fc22b1864ff25335b15cf763a8e18
i386/kernel-smp-debug-2.6.19-1.2288.fc5.i686.rpm
951091984e0efa289bf77188a11dd473e15cc0d4
i386/kernel-xen0-2.6.19-1.2288.fc5.i686.rpm
e9ba0e72826122d2e3182ebf62c633225da71f68
i386/kernel-debug-devel-2.6.19-1.2288.fc5.i686.rpm
1ccfc18da96ca51f8690a7a732809911822bf2d0
i386/kernel-smp-devel-2.6.19-1.2288.fc5.i686.rpm
7133c25a70042423c9263533389c56134eddbd2d
i386/kernel-xen-2.6.19-1.2288.fc5.i686.rpm
49393d8a17ae79e9bc00dcae25a529ee14d73a85
i386/kernel-2.6.19-1.2288.fc5.i686.rpm
2df37544b47c99306ea41b651f1a89c27225af01
i386/kernel-kdump-devel-2.6.19-1.2288.fc5.i686.rpm
b37b4c8cff25ed2cd5de0572e437ff31e4899933
i386/kernel-smp-debug-devel-2.6.19-1.2288.fc5.i686.rpm
54b4cf37db3acbef5f8a9b99fdd0df8097a63d6d
i386/kernel-smp-2.6.19-1.2288.fc5.i686.rpm
6a947d3a63263a01b00afbd17c09713b9235790f
i386/kernel-xenU-devel-2.6.19-1.2288.fc5.i686.rpm
5c524bf0774a144667806b20741415c844a15003
i386/debug/kernel-debuginfo-2.6.19-1.2288.fc5.i686.rpm
8f07ed7ad8dabb3cf13f3f22bffeda1b94cbd04f
i386/kernel-kdump-2.6.19-1.2288.fc5.i686.rpm
4d22a04484402caf09ec7a97cd2a57fd97e3fe01
i386/kernel-devel-2.6.19-1.2288.fc5.i686.rpm
3223cadcc8fb937ca5e0ac1c68f490dab8f56be4
i386/kernel-xenU-2.6.19-1.2288.fc5.i686.rpm
96f5180be11d3922ed081844f2519cf0e5ee7e17
i386/kernel-debug-2.6.19-1.2288.fc5.i686.rpm
84c940efe2f20536463e1d47c8356d32310bd9ed
i386/kernel-xen-devel-2.6.19-1.2288.fc5.i686.rpm
9c8c130762f2a7080047717abb7274f4119f8798
i386/kernel-doc-2.6.19-1.2288.fc5.noarch.rpm

This update can be installed with the ‘yum’ update program. Use
‘yum update package-name’ at the command line. For more
information, refer to ‘Managing Software with yum,’ available at
http://fedora.redhat.com/docs/yum/.


Fedora Update Notification
FEDORA-2007-226
2007-02-13


Product : Fedora Core 6
Name : kernel
Version : 2.6.19
Release : 1.2911.fc6
Summary : The Linux kernel (the core of the Linux operating
system)

Description :
The kernel package contains the Linux kernel (vmlinuz), the core of
any Linux operating system. The kernel handles the basic functions
of the operating system: memory allocation, process allocation,
device input and output, etc.


Update Information:

CVE-2006-0007:
The key serial number collision avoidance code in the
key_alloc_serial function in Linux kernel 2.6.9 up to 2.6.20 allows
remote attackers to cause a denial of service (crash) via vectors
that trigger a null dereference, as originally reported as
“spinlock CPU recursion.”

Update to linux kernel 2.6.19.3:
www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19.3

Bugs fixed:
227802, 226885, 225046, 223431


  • Sat Feb 10 2007 Chuck Ebbert <cebbert@redhat.com>
  • clean up one “provides”
  • add fixes for RHBZ#211672 (CIFS) and RHBZ#227802 (8139too)
  • add more NAPI fixes
  • Thu Feb 8 2007 Chuck Ebbert <cebbert@redhat.com>
  • fix fallout from the 2.6.19.3 update clashing with utrace
  • Thu Feb 8 2007 Chuck Ebbert <cebbert@redhat.com>
  • fix “provides” for devel packages
  • Tue Feb 6 2007 Chuck Ebbert <cebbert@redhat.com>
  • disable Tux
  • add another GFS2 update
  • add crypto key collision patch (CVE-2007-0006)
  • Mon Feb 5 2007 Dave Jones <davej@redhat.com>
  • Reenable Tux.
  • Mon Feb 5 2007 Chuck Ebbert <cebbert@redhat.com>
  • Sun Feb 4 2007 Dave Jones <davej@redhat.com>
  • 2.6.19.3rc1
  • Move xen sources out of kernel-xen-devel. (Don Zickus)
  • Sat Feb 3 2007 Dave Jones <davej@redhat.com>
  • Remove kdump config options from non-kdump configs. This will
    fix the ‘reboots as soon as booting up’ bug.
  • Thu Feb 1 2007 Chuck Ebbert <cebbert@redhat.com>
  • Added i586 AES and Blowfish modules to i686 config
  • Wed Jan 31 2007 Markus Armbruster
    <armbru@redhat.com>
  • Xenoprof for intel core (#215519).
  • Fix iSCSI root oops on x86_64 xen domU.
  • Tue Jan 30 2007 Chuck Ebbert <cebbert@redhat.com>
    • Minor config file changes
  • Mon Jan 29 2007 Dave Jones <davej@redhat.com>
    • Fix attr2 corruption with btree data extents
  • Tue Jan 23 2007 Juan Quintela <quintela@redhat.com>
    • update xen kernel patch
    • pvfb is now included in it.
    • changeset: 43493:67d20a7ca5f9
    • update to kernel 2.6.19.2.
  • Mon Jan 15 2007 Markus Armbruster <armbru@redhat.com>
    • Update Xen paravirt framebuffer patch to upstream xen-unstable
      changeset 13066, less changeset 12680, because that breaks with
      console=tty console=xvc. Also change default domU console back to
      /dev/xcv0. This changes the protocol to the one accepted
      upstream.
    • Add compatibility with guests running our initial
      protocol.
    • Update Xen console major/minor to lanana.org-assigned
      numbers.

This update can be downloaded from:

    

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis