kernel-image-2.6.8-sparc (2.6.8-15sarge4) stable-security; urgency=high

  * Build against kernel-tree-2.6.8-16sarge4:
    * proc-environ-race-1.dpatch, proc-environ-race-2.dpatch
      [SECURITY] Fix local root vulnerability caused by a race in proc
      See CVE-2006-3626

 -- dann frazier <dannf@debian.org>  Sat, 15 Jul 2006 09:16:24 -0600

kernel-image-2.6.8-sparc (2.6.8-15sarge3) stable-security; urgency=low

  * Build against kernel-tree-2.6.8-16sarge3:
    * net-protocol-mod-refcounts-pre.dpatch, net-protocol-mod-refcounts.dpatch
      [SECURITY] Fix potential DoS (panic) cause by inconsistent reference
      counting in network protocol modules.
      See CVE-2005-3359
    * netfilter-do_replace-overflow.dpatch
      [SECURITY] Fix buffer overflow in netfilter do_replace which can could
      be triggered by users with CAP_NET_ADMIN rights.
      See CVE-2006-0038
    * sys_mbind-sanity-checking.dpatch
      [SECURITY] Make sure maxnodes is safe size before calculating nlongs in
      get_nodes() to prevent a local DoS vulnerability.
      See CVE-2006-0557
    * smbfs-chroot-escape.dpatch
      [SECURITY] Fix directory traversal vulnerability in smbfs that permits
      local users to escape chroot restrictions
      See CVE-2006-1864
    * perfmon-exit-race.dpatch
      [SECURITY][ia64] Fix local denial of service vulnerability (oops) in
      the ia64 perfmon subsystem
      See CVE-2006-0558
    * ia64-die_if_kernel-returns.dpatch
      [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by
      an incorrect 'noreturn' attribute on die_if_kernel()
      See CVE-2006-0742
    * smbfs-chroot-escape.dpatch
      [SECURITY] Fix directory traversal vulnerability in smbfs that permits
      local users to escape chroot restrictions
      See CVE-2006-1863
    * binfmt-bad-elf-entry-address.dpatch
      [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf
      code on em64t processors
      See CVE-2006-0741
    * em64t-uncanonical-return-addr.dpatch
      [SECURITY][amd64] Fix local DoS vulnerability on em64t systems that
      arises when returning program control using SYSRET
      See CVE-2006-0744
    * sctp-discard-unexpected-in-closed.dpatch
      [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks
      received in CLOSED state instead of calling BUG()
      See CVE-2006-2271
    * ipv4-id-no-increment.dpatch
      [SECURITY] Fix vulnerability that allows remote attackers to conduct an
      Idle Scan attack, bypassing intended protections against such attacks
      See CVE-2006-1242
    * usb-gadget-rndis-bufoverflow.dpatch
      [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that
      allows for a remote DoS attack (kmalloc'd memory corruption)
      See CVE-2006-1368
    * group_complete_signal-BUG_ON.dpatch
      [SECURITY] Fix improper use of BUG_ON in __group_complete_signal()
      See CVE-2006-1523
    * madvise_remove-restrict.dpatch
      [SECURITY] Fix vulnerability that allows local users to bypass IPC
      permissions and replace portions of read-only tmpfs files with zeroes.
      See CVE-2006-1524
    * mcast-ip-route-null-deref.dpatch
      [SECURITY] Fix local DoS vulnerability that allows local users to panic
      a system by requesting a route for a multicast IP
      See CVE-2006-1525
    * sctp-fragment-recurse.dpatch
      [SECURITY] Fix remote DoS vulnerability that can lead to infinite
      recursion when a packet containing two or more DATA fragments is received
      See CVE-2006-2274
    * sctp-fragmented-receive-fix.dpatch
      [SECURITY] Fix remote DoS vulnerability that allows IP fragmented
      COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic
      See CVE-2006-2272
    * amd64-fp-reg-leak-dep[1-3].dpatch, amd64-fp-reg-leak.dpatch
      [SECURITY][amd64] Fix an information leak that allows a process to see
      a portion of the floating point state of other processes, possibly
      exposing sensitive information.
      See CVE-2006-1056
    * do_add_counters-race.dpatch
      [SECURITY] Fix race condition in the do_add_counters() function in
      netfilter that allows local users with CAP_NET_ADMIN capabilities to
      read kernel memory
      See CVE-2006-0039
    * s390-strnlen_user-return.dpatch
      [SECURITY][s390] Fix local DoS on s390 that may result from strnlen_user
      returning a value that is too large
      See CVE-2006-0456
    * xfs-ftruncate-leak.dpatch
      [SECURITY] Fix leak in the ftruncate call in the XFS filesystem that may
      permit local users to view sensitive information
      See CVE-2006-0554
    * nfs-another-O_DIRECT-fix.dpatch
      [SECURITY] Fix a potential local DoS vulnerability in the NFS O_DIRECT
      code
      See CVE-2006-0555
    * sctp-hb-ack-overflow.dpatch
      [SECURITY] Fix a remote buffer overflow that can result from a badly
      formatted HB-ACK chunk
      See CVE-2006-1857
    * sctp-param-bound-checks.dpatch
      [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter
      checking code
      See CVE-2006-1858

 -- dann frazier <dannf@debian.org>  Wed, 24 May 2006 20:22:10 -0500

kernel-image-2.6.8-sparc (2.6.8-15sarge2) stable-security; urgency=high

  * Rebuild against kernel-tree-2.6.8-16sarge2
  * Increment ABI to -3

 -- dann frazier <dannf@debian.org>  Wed,  1 Feb 2006 00:37:10 -0700

kernel-image-2.6.8-sparc (2.6.8-15sarge1) stable-security; urgency=high

  * Rebuild against kernel-tree-2.6.8-16sarge1 (dann frazier).

 -- dann frazier <dannf@dannf.org>  Fri, 19 Aug 2005 11:31:15 -0600

kernel-image-2.6.8-sparc (2.6.8-15) unstable; urgency=high

  * Fix typo in -sparc32 image description. Oops (Joshua Kwan).
  * Build against 2.6.8-15 (Andres Salomon).

 -- Andres Salomon <dilinger@debian.org>  Wed, 23 Mar 2005 01:03:31 -0500

kernel-image-2.6.8-sparc (2.6.8-6) unstable; urgency=high

  * Bump soname to 2 due to security fixes which break binary
    compatibility.
  * Build from 2.6.8-11, pulling in lots of juicy sparc fixes.
    closes: #287287
  * Remove bogus export CC := gcc-3.4 that was only used for debugging
    and caused a FTBFS.
  * Version kernel-headers dependency on kernel-kbuild-2.6-3.
  * Fix lots of things concerning kernel-headers generation by borrowing
    lots of code from i386. closes: #285847
  * Improve package descriptions.

 -- Joshua Kwan <joshk@triplehelix.org>  Mon, 27 Dec 2004 18:35:33 -0800

kernel-image-2.6.8-sparc (2.6.8-5) unstable; urgency=high

  * Add CONFIG_DM9102=m for some Netra X1s and Sun Fire V100s.
    Thanks Thomas Michlmayr.

 -- Joshua Kwan <joshk@triplehelix.org>  Thu, 25 Nov 2004 17:42:40 -0800

kernel-image-2.6.8-sparc (2.6.8-4) unstable; urgency=high

  * build from kernel-tree-2.6.8-9 to fix lots of bugs:
    - fix possible timeouts with sunzilog (benh)
    - fix broken initialization method for cg14 framebuffer (Bob Breuer)
    - sparc32: fix memcpy() bug that caused ramdisk failure (Jurij Smakov)
    - sparc64: don't let breaks get eaten by sunsab (Jurij Smakov)

 -- Joshua Kwan <joshk@triplehelix.org>  Wed, 24 Nov 2004 19:01:31 -0500

kernel-image-2.6.8-sparc (2.6.8-3) unstable; urgency=high

  * Ugh, add missing Depends line for sparc64-smp. (Closes: #269274)
  * Use the btfix'd System.map to fix sparc32 piggybacks for d-i.
  * Build from kernel-tree-2.6.8-6.

 -- Joshua Kwan <joshk@triplehelix.org>  Sun, 17 Oct 2004 17:20:46 -0400

kernel-image-2.6.8-sparc (2.6.8-2) unstable; urgency=high

  * Patches from David Miller added to allow d-i to work on sparc64,
    so change bdep to kernel-tree-2.6.8-5.
  * Nuke metapackages in favor of kernel-latest-2.6-sparc.
  * Add sparc32 UP!
  * Disable nfsroot support because we don't build any kernel NIC
    drivers in any more.

 -- Joshua Kwan <joshk@triplehelix.org>  Fri, 27 Aug 2004 11:34:07 -0700

kernel-image-2.6.8-sparc (2.6.8-1) unstable; urgency=high

  * New upstream version.
  * Not for sparc32 SMP, unfortunately.
  * From kernel-image-sparc-2.4:
    - Disable JFS support. It seems to be 64-bit unclean right now,
      along with SCTP.
    - Switch to an initrd scheme, finally.
  * Add dependency on module-init-tools.
  * Remove build-dependency on gcc-3.3, handled by build-essential already,
    but change it to gcc (>= 4:3.3).
  * Change to Herbert Xu's build system.

 -- Joshua Kwan <joshk@triplehelix.org>  Fri, 16 Jul 2004 01:33:13 -0700
