From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Date: Mon, 26 Nov 2007 15:33:04 +0300 From: "Dmitry V. Levin" To: ALT Devel discussion list Message-ID: <20071126123304.GE13675@basalt.office.altlinux.org> Mail-Followup-To: ALT Devel discussion list , Sergey Vlasov References: <20071126012134.GA30307@hint1.office.altlinux.org> <20071126095511.GQ28492@osdn.org.ua> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="47eKBCiAZYFK5l32" Content-Disposition: inline In-Reply-To: <20071126095511.GQ28492@osdn.org.ua> X-fingerprint: FE4C 93AB E19A 2E4C CB5D 3E4E 7CAB E6AC 9E35 361E Cc: Sergey Vlasov Subject: Re: [devel] q: kernel-image-std-smp +/- forcedeth X-BeenThere: devel@lists.altlinux.org X-Mailman-Version: 2.1.9 Precedence: list Reply-To: ALT Linux Team development discussions List-Id: ALT Linux Team development discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Nov 2007 12:33:06 -0000 Archived-At: List-Archive: List-Post: --47eKBCiAZYFK5l32 Content-Type: text/plain; charset=koi8-r Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Mon, Nov 26, 2007 at 11:55:11AM +0200, Michael Shigorin wrote: > On Mon, Nov 26, 2007 at 04:21:34AM +0300, QA Team Robot wrote: > > kernel-image-std-pae - The Linux kernel (the core of the Linux operatin= g system) > > * Sat Nov 24 2007 Sergey Vlasov 2.6.18-alt9 > > - Security-related changes: > > + CVE-2006-6058: minix: limit printks on corrupted dir i_size > > + CVE-2007-2875: cpuset: fix information leak through /dev/cpuset/tas= ks > > + CVE-2007-2878: vfat: fix compat ioctls memory corruption on 64-bit = systems > > + CVE-2007-3105: random: fix bound check ordering > > + CVE-2007-3513: usblcd: limit memory consumption during write > > + CVE-2007-3731 [1/2]: ptrace: handle bogus %cs in single-step decodi= ng > > + CVE-2007-3731 [2/2]: i386: fix TRACE_IRQS_ON without proper segment= setup > > + CVE-2007-3740: cifs: respect umask when unix extensions are enabled > > + CVE-2007-3843: cifs: fail mount if signing is requested but not sup= ported > > + CVE-2007-3848: reset current->pdeath_signal on SUID binary execution > > + CVE-2007-4133: don't allow the stack to grow into hugetlb reserved = regions > > + CVE-2007-4133: hugetlbfs: fix prio_tree unit > > + CVE-2007-4308: aacraid: require CAP_SYS_ADMIN for configuration ioc= tls > > + CVE-2007-4997: ieee80211: avoid integer underflow for runt rx frames > > + CVE-2007-5500: wait_task_stopped: Check p->exit_state, not TASK_TRA= CED > >=20 > > - Filesystem fixes: > > + locks: fix possible infinite loop in posix deadlock detection > >=20 > > - Updated BuildRequires (kernel-build-tools changed to rpm-build-kernel= ). > > - Added BuildRequires(pre): rpm-build-kernel to get clean build in hash= er. > > * Sun Sep 23 2007 Sergey Vlasov 2.6.18-alt8 > > - CVE-2007-4573 (x86_64 only): Zero extend all registers after ptrace i= n 32bit > > entry path. > > * Thu Aug 02 2007 Sergey Vlasov 2.6.18-alt7 >=20 > =F3=C5=D2=A3=D6, =C1 =D3 forcedeth-=D4=CF =DE=D4=CF, =C9=CC=C9 =D7=D3=A3 = =D4=CF=D4 =D6=C5 =D3=D4=C1=D2=D9=CA-=C7=CC=C0=DE=CE=D9=CA? :( > [#12221] =FC=D4=CF =DE=C9=D3=D4=D9=CA secfix, =CF=C2=CE=CF=D7=CC=C5=CE=C9=C5 kernel-= image-std-smp =D0=CF forcedeth =C9 =C4=D2. =C2=D5=C4=C5=D4 =D7 =D3=CC=C5=C4=D5=C0=DD=C5=CD =D2=C5=CC=C9=DA=C5 =D0=C1= =CB=C5=D4=C1. --=20 ldv --47eKBCiAZYFK5l32 Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (GNU/Linux) iD8DBQFHSr0AfKvmrJ41Nh4RAt0yAJ0e0ZrhFRM+2yhSP6rNpa+KeTPRQgCgqFsB AvkSR/IQOYpR6JZKjphgOI0= =6h6W -----END PGP SIGNATURE----- --47eKBCiAZYFK5l32--