kernel-image-2.6.8-ia64 (2.6.8-15sarge1) oldstable-security; urgency=high

  * Rebuild against kernel-tree-2.6.8-17sarge1
    * compat_sys_mount-NULL-data_page.dpatch
      [SECURITY] Fix oops in compat_sys_mount triggered by NULL data_page
      See CVE-2006-7203
    * pppoe-socket-release-mem-leak.dpatch
      [SECURITY] fix unpriveleged memory leak when a PPPoE socket is released
      after connect but before PPPIOCGCHAN ioctl is called upon it
      See CVE-2007-2525
    * dn_fib-out-of-bounds.dpatch, ipv4-fib_props-out-of-bounds.dpatch
      [SECURITY] Fix out of bounds condition in dn_fib_props[]
      See CVE-2007-2172
    * aacraid-ioctl-perm-check.dpatch
      [SECURITY] Require admin capabilities to issue ioctls to aacraid devices
      See CVE-2007-4308
    * reset-pdeathsig-on-suid.dpatch
      [SECURITY] Fix potential privilege escalation caused by improper
      clearing of the child process' pdeath signal.
      See CVE-2007-3848
    * bluetooth-l2cap-hci-info-leaks.dpatch
      [SECURITY] Fix information leaks in setsockopt() implementations
      See CVE-2007-1353
    * coredump-only-to-same-uid.dpatch
      [SECURITY] Fix an issue where core dumping over a file that
      already exists retains the ownership of the original file
      See CVE-2007-6206
    * i4l-isdn_ioctl-mem-overrun.dpatch
      [SECURITY] Fix potential isdn ioctl memory overrun
      See CVE-2007-6151
    * cramfs-check-block-length.dpatch
      [SECURITY] Add a sanity check of the block length in cramfs_readpage to
      avoid a potential oops condition
      See CVE-2006-5823
    * ext2-skip-pages-past-num-blocks.dpatch
      [SECURITY] Add some sanity checking for a corrupted i_size in
      ext2_find_entry()
      See CVE-2006-6054
    * minixfs-printk-hang.dpatch
      [SECURITY] Rate-limit printks caused by accessing a corrupted minixfs
      filesystem that would otherwise cause a system to hang (printk storm)
      See CVE-2006-6058
    * isdn-net-overflow.dpatch
      [SECURITY] Fix potential overflows in the ISDN subsystem
      See CVE-2007-6063
    * prevent-stack-growth-into-hugetlb-region.dpatch
      [SECURITY] Prevent OOPS during stack expansion when the VMA crosses
      into address space reserved for hugetlb pages.
      See CVE-2007-3739
    * cifs-honor-umask.dpatch
      [SECURITY] Make CIFS honor a process' umask
      See CVE-2007-3740
    * hugetlb-prio_tree-unit-fix.dpatch
      [SECURITY] Fix misconversion of hugetlb_vmtruncate_list to prio_tree
      which could be used to trigger a BUG_ON() call in exit_mmap.
      See CVE-2007-4133
    * amd64-zero-extend-32bit-ptrace.dpatch
      [SECURITY] Zero extend all registers after ptrace in 32-bit entry path.
      See CVE-2007-4573
    * usb-pwc-disconnect-block.dpatch
      [SECURITY] Fix issue with unplugging webcams that use the pwc driver.
      If userspace still has the device open it can result, the driver would
      wait for the device to close, blocking the USB subsystem.
      See CVE-2007-5093
    * powerpc-chrp-null-deref.dpatch
      [SECURITY][powerpc] Fix NULL pointer dereference if get_property
      fails on the subarchitecture
      See CVE-2007-6694
    * random-bound-check-ordering.dpatch
      [SECURITY] Fix stack-based buffer overflow in the random number
      generator
      See CVE-2007-3105
    * mmap-VM_DONTEXPAND.dpatch
      [SECURITY] Add VM_DONTEXPAND to vm_flags in drivers that register
      a fault handler but do not bounds check the offset argument
      See CVE-2008-0007

 -- dann frazier <dannf@debian.org>  Tue, 19 Feb 2008 01:37:42 -0700

kernel-image-2.6.8-ia64 (2.6.8-15) oldstable; urgency=high

  * Rebuild against kernel-tree-2.6.8-17
    [ Simon Horman ]
    * drivers-net-via-rhine-wol-oops.dpatch (removed):
      This patch breaks the via-rhine driver and 2.6.8 and is
      completely bogus for this version of the kernel
      (closes: #311357)

    * drivers-media-vidio-bttv-vc100xp-detect.dpatch
      Allow Leadtek WinFast VC100 XP cards to work.

    * fs-jbd-checkpoint-assertion.dpatch
      Fix possible false assertion failure in log_do_checkpoint(). We might fail
      to detect that we actually made a progress when cleaning up the checkpoint
      lists if we don't retry after writing something to disk.

    * mm-rmap-out-of-bounds-pte.dpatch
      Stop try_to_unmap_cluster() passing out-of-bounds pte to pte_unmap()

    * net-ipv4-netfilter-ip_queue-deadlock.dpatch
      Fix deadlock with ip_queue and tcp local input path.

    * asm-i386-mem-clobber.dpatch:
      Make sure gcc doesn't reorder memory accesses in strncmp and friends on
      i386.

    * drivers-acpi-pci_irq-elcr.dpatch:
      Make sure we call acpi_register_gsi() even for default PCI interrupt
      assignment. That's the part that keeps track of the ELCR register, and we
      want to make sure that the PCI interrupts are properly marked level/low.

    [ dann frazier ]
    * Merge in applicable fixes from 2.6.12.4
       - netfilter-deadlock-ip6_queue.dpatch
       - rocket_c-fix-ldisc-ref-count.dpatch
       - early-vlan-fix.dpatch

    [ Simon Horman ]
    * drivers-sata-promise-sataii_tx2_tx4.dpatch
      Add SATAII TX2 and TX2/TX4 support to sata promise driver
      (Closes: #317286)

    * module-per-cpu-alignment-fix.dpatch
      Module per-cpu alignment cannot always be met
      From 2.6.12.5

    * genelink-usbnet-skb-typo.dpatch
      fix gl_skb/skb type error in genelink driver in usbnet
      Backported From 2.6.12.6

    * drivers-ide-ppp-pmac-build.dpatch
      Make sure BLK_DEV_IDEDMA_PCI is defined for pmac ide driver builds
      (closes: #321442)

    * fs-ext3-nfs-parent-fix.dpatch
      ext3 file systems mounted over nfs may lookup .. in dx directories
      causing an oops.
      (closes: #323557)

    * sparc-request_irq-in-RTC-fix.dpatch
      Use SA_SHIRQ in sparc specific code.
      From 2.6.13.1

    * forcedeth-init-link-settings-in-nv_open.patch
      forcedeth: Initialize link settings in every nv_open()
      From 2.6.13.2

    * fix-MPOL_F_VERIFY.patch
      Fix MPOL_F_VERIFY
      From 2.6.13.2

    * fix-more-byte-to-dword-writes-to-PCI_ROM_ADDRESS-config-word.patch
      Fix up more strange byte writes to the PCI_ROM_ADDRESS config word
      From 2.6.13.2

    * yenta-oops-fix.patch
      yenta oops fix
      From 2.6.13.3

    * fix-de_thread-BUG_ON.patch
      Fix fs/exec.c:788 (de_thread()) BUG_ON
      From 2.6.13.3

    * ipv6-fix-per-socket-multicast-filtering.patch
      fix IPv6 per-socket multicast filtering in exact-match case
      From 2.6.13.3

    * ipvs-ip_vs_ftp-breaks-connections.patch
      ipvs: ip_vs_ftp breaks connections using persistence
      From 2.6.13.3

    * ieee1394-sbp2-fixes-for-hot-unplug-and-module-unloading.dpatch
      ieee1394/sbp2: fixes for hot-unplug and module unloading
      From 2.6.13.4

    * fix-sparc64-fpu-register-corruption.dpatch
      [SPARC64]: Fix userland FPU state corruption.
      From 2.6.13.4

    [ dann frazier ]
    * drivers-block-raw-ioctl2.dpatch, drivers-block-ioctl-enotty.dpatch:
      Fix a bug in the block layer that causes a bootloader installation
      error under certain conditions - breaks installation on cciss devices.
      (closes: #354493)
    * Fix data corruption with dm-crypt over RAID5 (closes: #336153)
    * Fix VLAN support for 3c59x/90x series hardware (closes: #349774)
    * Fix erroneous calculation of 'len' parameter to NLMSG_PUT resulting in
      bogus 'error during NLMSG_PUT' messages (closes: #372621)
    * hp-diva-rmp3.dpatch, hp-diva-hurricane.dpatch:
      Add PCI IDs for newer Diva console ports

 -- dann frazier <dannf@debian.org>  Sat, 26 May 2007 04:04:02 -0600

kernel-image-2.6.8-ia64 (2.6.8-14sarge7) oldstable-security; urgency=high

  * Rebuild against kernel-tree-2.6.8-16sarge7 which requires
    an ABI increment:
    * [ERRATA] smbfs-honor-mount-opts-2.dpatch
      Fix some regressions with respect to file types (e.g., symlinks)
      introduced by the fix for CVE-2006-5871 in 2.6.8-16sarge6
    * mincore_hang.dpatch
      [SECURITY] Fix a potential deadlock in mincore, thanks to Marcel
      Holtmann for the patch.
      See CVE-2006-4814
    * mincore-fixes.dpatch
      This patch includes a few fixes, necessary for mincore_hang.dpatch to
      apply cleanly.
    * dev_queue_xmit-error-path.dpatch
      [SECURITY] Correct an error path in dev_queue_xmit() to rebalance
      local_bh_enable() calls. Patch from Vasily Averin.
      See CVE-2006-6535
    * dvb-core-handle-0-length-ule-sndu.dpatch
      [SECURITY] Avoid sending invalid ULE packets which may not properly
      handled by the receiving side triggering a crash. This is a backport
      of the patch that went into 2.6.17.y. It would be better to fix the
      receiving end, but no patch for the era kernel has been developed yet.
      See CVE-2006-4623
    * bluetooth-capi-size-checks.dpatch
      [SECURITY] Add additional length checks to avoid potential remote
      DoS attacks in the handling of CAPI messages in the bluetooth driver
      See CVE-2006-6106
    * __find_get_block_slow-race.dpatch
      [SECURITY] Fix infinite loop in __find_get_block_slow that can
      be triggered by mounting and accessing a malicious iso9660 or NTFS
      filesystem
      See CVE-2006-5757, CVE-2006-6060
    * listxattr-mem-corruption.dpatch
      [SECURITY] Fix userspace corruption vulnerability caused by
      incorrectly promoted return values in bad_inode_ops
      This patches changes the kernel ABI.
      See CVE-2006-5753
    * aio-fix-nr_pages-init.dpatch
      [SECURITY] Fix initialization of info->nr_pages in aio_setup_ring() to
      avoid a race that can lead to a system crash
      See CVE-2006-5754
    * unmap_hugepage_area-check-null-pte.dpatch
      [SECURITY] Fix a potential DoS (crash) in unmap_hugepage_area().
      No kernel-image builds appear to compile this code, so this fix is only
      for users that compile their own kernels with the Debian source and
      enable/use huge pages.
      See CVE-2005-4811
    * ext3-fsfuzz.dpatch
      [SECURITY] Fix a DoS vulnerability that can be triggered by a local
      user with the ability to mount a corrupted ext3 filesystem
      See CVE-2006-6053
    * hfs-no-root-inode.dpatch
      [SECURITY] Fix bug in HFS where hfs_fill_super returns success even
      if no root inode is found. On an SELinux-enabled system, this can
      be used to trigger a local DoS. Debian does not enable SELinux by
      default.
      See CVE-2006-6056
    * ipv6_fl_socklist-no-share.dpatch
      [SECURITY] Fix local DoS vulnerability caused by inadvertently sharing
      ipv6_fl_socklist between the listening socket and the socket created
      for connection.
      See CVE-2007-1592
    * core-dump-unreadable-PT_INTERP.dpatch
      [SECURITY] Fix a vulnerability that allows local users to read
      otherwise unreadable (but executable) files by triggering a core dump.
      See CVE-2007-0958
    * appletalk-length-mismatch.dpatch
      [SECURITY] Fix a remote DoS (crash) in appletalk
      Depends upon appletalk-endianness-annotations.dpatch
      See CVE-2007-1357

 -- dann frazier <dannf@debian.org>  Mon, 16 Apr 2007 15:40:39 -0700

kernel-image-2.6.8-ia64 (2.6.8-14sarge6) stable-security; urgency=high

  * Build against kernel-tree-2.6.8-16sarge6:
    * perfmon-fd-refcnt.dpatch
      [SECURITY][ia64] Fix file descriptor leak in perfmonctl
      system call which could be used as a local denial of service attack
      by depleting the system of file descriptors
      See CVE-2006-3741
    * ia64-sparc-cross-region-mappings.dpatch
      [SECURITY] Prevent cross-region mappings on ia64 and sparc which
      could be used in a local DoS attack (system crash)
      See CVE-2006-4538
    * __block_prepare_write-recovery.dpatch
      [SECURITY] Fix an information leak in __block_prepare_write()
      See CVE-2006-4813
    * atm-clip-freed-skb-deref.dpatch
      [SECURITY] Avoid dereferencing an already freed skb, preventing a
      potential remote DoS (system crash) vector
      See CVE-2006-4997
    * ip6_flowlabel-lockup.dpatch
      [SECURITY] Fix local DoS attack vector (lockups, oopses) in the
      sequence handling for /proc/net/ip6_flowlabel
      See CVE-2006-5619
    * ppc-alignment-exception-table-check.dpatch
      [SECURITY][ppc] Avoid potential DoS which can be triggered by some
      futex ops
      See CVE-2006-5649
    * s390-uaccess-memleak.dpatch
      [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
      remaining bytes of the kernel buffer after a fault on the userspace
      address in copy_from_user()
      See CVE-2006-5174
    * smbfs-honor-mount-opts.dpatch
      Honor uid, gid and mode mount options for smbfs even when unix extensions
      are enabled
      See CVE-2006-5871
    * bridge-get_fdb_entries-overflow.dpatch
      Protect against possible overflow in get_fdb_entries
      See CVE-2006-5751

 -- dann frazier <dannf@debian.org>  Tue,  5 Dec 2006 02:20:33 -0700

kernel-image-2.6.8-ia64 (2.6.8-14sarge5) stable-security; urgency=high

  * Build against kernel-tree-2.6.8-16sarge5:
    * [ERRATA] madvise_remove-restrict.dpatch
      [SECURITY] The 2.6.8-16sarge3 changelog associated this patch with
      CVE-2006-1524. However, this patch fixes an mprotect issue that was
      split off from the original report into CVE-2006-2071. 2.6.8 is not
      vulnerable to CVE-2006-1524 the madvise_remove issue.
      See CVE-2006-2071
    * fs-ext3-bad-nfs-handle.dpatch
      [SECURITY] James McKenzie discovered a Denial of Service vulnerability
      in the NFS driver. When exporting an ext3 file system over NFS, a remote
      attacker could exploit this to trigger a file system panic by sending
      a specially crafted UDP packet.
      See CVE-2006-3468
    * direct-io-write-mem-leak.dpatch
      [SECURITY] Fix memory leak in O_DIRECT write.
      See CVE-2004-2660
    * nfs-handle-long-symlinks.dpatch
      [SECURITY] Fix buffer overflow in NFS readline handling that allows a
      remote server to cause a denial of service (crash) via a long symlink
      See CVE-2005-4798
    * cdrom-bad-cgc.buflen-assign.dpatch
      [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially
      be used by a local user to trigger a buffer overflow via a specially
      crafted DVD, USB stick, or similar automatically mounted device.
      See CVE-2006-2935
    * usb-serial-ftdi_sio-dos.patch
      [SECURITY] fix userspace DoS in ftdi_sio driver
      See CVE-2006-2936
    * selinux-tracer-SID-fix.dpatch
      [SECURITY] Fix vulnerability in selinux_ptrace that prevents local
      users from changing the tracer SID to the SID of another process
      See CVE-2006-1052
    * netfilter-SO_ORIGINAL_DST-leak.dpatch
      [SECURITY] Fix information leak in SO_ORIGINAL_DST
      See CVE-2006-1343
    * sg-no-mmap-VM_IO.dpatch
      [SECURITY] Fix DoS vulnerability whereby a local user could attempt
      a dio/mmap and cause the sg driver to oops.
      See CVE-2006-1528
    * exit-bogus-bugon.dpatch
      [SECURITY] Remove bogus BUG() in exit.c which could be maliciously
      triggered by a local user
      See CVE-2006-1855
    * readv-writev-missing-lsm-check.dpatch,
      readv-writev-missing-lsm-check-compat.dpatch
      [SECURITY] Add missing file_permission callback in readv/writev syscalls
      See CVE-2006-1856
    * snmp-nat-mem-corruption-fix.dpatch
      [SECURITY] Fix memory corruption in snmp_trap_decode
      See CVE-2006-2444
    * kfree_skb-race.dpatch
      [SECURITY] Fix race between kfree_skb and __skb_unlink
      See CVE-2006-2446
    * hppa-mb-extraneous-semicolon.dpatch,
      sparc32-mb-extraneous-semicolons.dpatch,
      sparc64-mb-extraneous-semicolons.dpatch:
      Fix a syntax error caused by extranous semicolons in smp_mb() macros
      which resulted in a build failure with kfree_skb-race.dpatch
    * sctp-priv-elevation.dpatch
      [SECURITY] Fix SCTP privelege escalation
      See CVE-2006-3745
    * sctp-priv-elevation-2.dpatch
      [SECURITY] Fix local DoS resulting from sctp-priv-elevation.dpatch
      See CVE-2006-4535
    * ppc-hid0-dos.dpatch
      [SECURITY][ppc] Fix local DoS by clearing HID0 attention enable on
      PPC970 at boot time
      See CVE-2006-4093
    * udf-deadlock.dpatch
      [SECURITY] Fix possible UDF deadlock and memory corruption
      See CVE-2006-4145

 -- dann frazier <dannf@debian.org>  Mon,  4 Sep 2006 09:31:16 -0600

kernel-image-2.6.8-ia64 (2.6.8-14sarge4) stable-security; urgency=high

  * Build against kernel-tree-2.6.8-16sarge4:
    * proc-environ-race-1.dpatch, proc-environ-race-2.dpatch
      [SECURITY] Fix local root vulnerability caused by a race in proc
      See CVE-2006-3626

 -- dann frazier <dannf@debian.org>  Sat, 15 Jul 2006 02:51:33 -0600

kernel-image-2.6.8-ia64 (2.6.8-14sarge3) stable-security; urgency=high

  * Build against kernel-tree-2.6.8-16sarge3:
    * net-protocol-mod-refcounts-pre.dpatch, net-protocol-mod-refcounts.dpatch
      [SECURITY] Fix potential DoS (panic) cause by inconsistent reference
      counting in network protocol modules.
      See CVE-2005-3359
    * netfilter-do_replace-overflow.dpatch
      [SECURITY] Fix buffer overflow in netfilter do_replace which can could
      be triggered by users with CAP_NET_ADMIN rights.
      See CVE-2006-0038
    * sys_mbind-sanity-checking.dpatch
      [SECURITY] Make sure maxnodes is safe size before calculating nlongs in
      get_nodes() to prevent a local DoS vulnerability.
      See CVE-2006-0557
    * smbfs-chroot-escape.dpatch
      [SECURITY] Fix directory traversal vulnerability in smbfs that permits
      local users to escape chroot restrictions
      See CVE-2006-1864
    * perfmon-exit-race.dpatch
      [SECURITY][ia64] Fix local denial of service vulnerability (oops) in
      the ia64 perfmon subsystem
      See CVE-2006-0558
    * ia64-die_if_kernel-returns.dpatch
      [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by
      an incorrect 'noreturn' attribute on die_if_kernel()
      See CVE-2006-0742
    * smbfs-chroot-escape.dpatch
      [SECURITY] Fix directory traversal vulnerability in smbfs that permits
      local users to escape chroot restrictions
      See CVE-2006-1863
    * binfmt-bad-elf-entry-address.dpatch
      [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf
      code on em64t processors
      See CVE-2006-0741
    * em64t-uncanonical-return-addr.dpatch
      [SECURITY][amd64] Fix local DoS vulnerability on em64t systems that
      arises when returning program control using SYSRET
      See CVE-2006-0744
    * sctp-discard-unexpected-in-closed.dpatch
      [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks
      received in CLOSED state instead of calling BUG()
      See CVE-2006-2271
    * ipv4-id-no-increment.dpatch
      [SECURITY] Fix vulnerability that allows remote attackers to conduct an
      Idle Scan attack, bypassing intended protections against such attacks
      See CVE-2006-1242
    * usb-gadget-rndis-bufoverflow.dpatch
      [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that
      allows for a remote DoS attack (kmalloc'd memory corruption)
      See CVE-2006-1368
    * group_complete_signal-BUG_ON.dpatch
      [SECURITY] Fix improper use of BUG_ON in __group_complete_signal()
      See CVE-2006-1523
    * madvise_remove-restrict.dpatch
      [SECURITY] Fix vulnerability that allows local users to bypass IPC
      permissions and replace portions of read-only tmpfs files with zeroes.
      See CVE-2006-1524
    * mcast-ip-route-null-deref.dpatch
      [SECURITY] Fix local DoS vulnerability that allows local users to panic
      a system by requesting a route for a multicast IP
      See CVE-2006-1525
    * sctp-fragment-recurse.dpatch
      [SECURITY] Fix remote DoS vulnerability that can lead to infinite
      recursion when a packet containing two or more DATA fragments is received
      See CVE-2006-2274
    * sctp-fragmented-receive-fix.dpatch
      [SECURITY] Fix remote DoS vulnerability that allows IP fragmented
      COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic
      See CVE-2006-2272
    * amd64-fp-reg-leak-dep[1-3].dpatch, amd64-fp-reg-leak.dpatch
      [SECURITY][amd64] Fix an information leak that allows a process to see
      a portion of the floating point state of other processes, possibly
      exposing sensitive information.
      See CVE-2006-1056
    * do_add_counters-race.dpatch
      [SECURITY] Fix race condition in the do_add_counters() function in
      netfilter that allows local users with CAP_NET_ADMIN capabilities to
      read kernel memory
      See CVE-2006-0039
    * s390-strnlen_user-return.dpatch
      [SECURITY][s390] Fix local DoS on s390 that may result from strnlen_user
      returning a value that is too large
      See CVE-2006-0456
    * xfs-ftruncate-leak.dpatch
      [SECURITY] Fix leak in the ftruncate call in the XFS filesystem that may
      permit local users to view sensitive information
      See CVE-2006-0554
    * nfs-another-O_DIRECT-fix.dpatch
      [SECURITY] Fix a potential local DoS vulnerability in the NFS O_DIRECT
      code
      See CVE-2006-0555
    * sctp-hb-ack-overflow.dpatch
      [SECURITY] Fix a remote buffer overflow that can result from a badly
      formatted HB-ACK chunk
      See CVE-2006-1857
    * sctp-param-bound-checks.dpatch
      [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter
      checking code
      See CVE-2006-1858

 -- dann frazier <dannf@debian.org>  Wed, 24 May 2006 19:45:16 -0500

kernel-image-2.6.8-ia64 (2.6.8-14sarge2) stable-security; urgency=high

  * Build against kernel-tree-2.6.8-16sarge2
  * Turn off CONFIG_PREEMPT, and change the ABI number to reflect the
    change.  This disables a potential DoS attack vector (which is not
    reproducible in later 2.6 kernels).

 -- dann frazier <dannf@debian.org>  Wed,  1 Feb 2006 00:05:17 -0700

kernel-image-2.6.8-ia64 (2.6.8-14sarge1) stable-security; urgency=low

  * Build against kernel-tree-2.6.8-16sarge1. (dann frazier)

 -- dann frazier <dannf@debian.org>  Tue, 16 Aug 2005 08:22:03 -0600

kernel-image-2.6.8-ia64 (2.6.8-14) unstable; urgency=medium

  * Try to get a new build into sarge, which means reverting ABI changes
    that would otherwise break d-i.
  * Rebuild against kernel-tree-2.6.8-16, which includes security fixes and
    reverts the ABI changing patches in kernel-tree-2.6.8-14 (they were
    actually reverted in kernel-tree-2.6.8-15)
  * Re-enable CONFIG_PREEMPT to revert the ABI change.  I'll try to push this
    change in through security.debian.org later.

 -- dann frazier <dannf@debian.org>  Fri, 27 May 2005 17:02:42 -0600

kernel-image-2.6.8-ia64 (2.6.8-13) unstable; urgency=low

  * Rebuild against kernel-tree-2.6.8-14
  * Change maintainer to kernel team, and add me as an uploader
  * Disable JFS, which would otherwise oops on mount - see #292050
  * Turn off CONFIG_PREEMPT, and change the ABI number to reflect the
    change.  This disables a potential DoS attack vector (which is not
    reproducible in later 2.6 kernels).

 -- dann frazier <dannf@debian.org>  Mon, 14 Mar 2005 11:44:40 -0700

kernel-image-2.6.8-ia64 (2.6.8-12) unstable; urgency=high

  * [SECURITY] Rebuild against kernel-tree-2.6.8-13, which includes security
    fixes.

 -- dann frazier <dannf@debian.org>  Mon, 31 Jan 2005 21:56:01 -0700

kernel-image-2.6.8-ia64 (2.6.8-11) unstable; urgency=high

  * [SECURITY] Rebuild against kernel-tree-2.6.8-12, which includes security
    fixes.

 -- dann frazier <dannf@debian.org>  Sat, 08 Jan 2005 11:50:52 -0700

kernel-image-2.6.8-ia64 (2.6.8-10) unstable; urgency=high

  * Bump SONAME - Closes: #284659
  * [SECURITY] Rebuild against kernel-tree-2.6.8-11, which includes a number
    of security fixes.
  * Link keyboard drivers statically.  Closes: 285910

 -- dann frazier <dannf@debian.org>  Wed, 29 Dec 2004 22:45:07 -0700

kernel-image-2.6.8-ia64 (2.6.8-9) unstable; urgency=high

  * [SECURITY] Build-dep on kernel-tree-2.6.8-10, which contains the recent
    binfmt_elf exploit fixes.

 -- dann frazier <dannf@debian.org>  Thu, 25 Nov 2004 14:14:48 -0700

kernel-image-2.6.8-ia64 (2.6.8-8) unstable; urgency=medium

  * Turn CONFIG_PREEMPT back on; it changes the module ABI

 -- dann frazier <dannf@debian.org>  Wed, 10 Nov 2004 23:13:46 -0700

kernel-image-2.6.8-ia64 (2.6.8-7) unstable; urgency=medium

  * Turn off CONFIG_PREEMPT
  * Rebuild against kernel-tree-2.6.8-8

 -- dann frazier <dannf@debian.org>  Tue, 09 Nov 2004 14:34:56 -0700

kernel-image-2.6.8-ia64 (2.6.8-6) unstable; urgency=medium

  * Add missing files needed for building modules to kernel-headers package,
    Closes: #266804
  * Increase CONFIG_BLK_DEV_RAM_SIZE to 32K, the size used by d-i

 -- dann frazier <dannf@debian.org>  Thu, 04 Nov 2004 20:07:24 -0700

kernel-image-2.6.8-ia64 (2.6.8-5) unstable; urgency=medium

  * Rebuild against kernel-tree-2.6.8-7

 -- dann frazier <dannf@debian.org>  Thu, 04 Nov 2004 19:07:03 -0700

kernel-image-2.6.8-ia64 (2.6.8-4) unstable; urgency=medium

  * Rebuild against kernel-tree-2.6.8-6

 -- dann frazier <dannf@debian.org>  Tue, 14 Sep 2004 20:14:32 -0600

kernel-image-2.6.8-ia64 (2.6.8-3) unstable; urgency=high

  * Rebuild against kernel-tree-2.6.8-5

 -- dann frazier <dannf@debian.org>  Sat, 28 Aug 2004 00:53:34 -0600

kernel-image-2.6.8-ia64 (2.6.8-2) unstable; urgency=high

  * Rebuild against kernel-tree-2.6.8-4

 -- dann frazier <dannf@debian.org>  Thu, 26 Aug 2004 21:58:47 -0600

kernel-image-2.6.8-ia64 (2.6.8-1) unstable; urgency=low

  * New upstream release
  * No need for a kernel-patch-2.6.8-ia64 at this time

 -- dann frazier <dannf@debian.org>  Wed, 18 Aug 2004 09:45:19 -0600

kernel-image-2.6.7-ia64 (2.6.7-3) unstable; urgency=low

  * Build against kernel-tree-2.6.7-3
  * Build against kernel-patch-2.6.7-ia64 (2.6.7-3)

 -- dann frazier <dannf@debian.org>  Sun, 11 Jul 2004 12:14:43 -0600

kernel-image-2.6.7-ia64 (2.6.7-2) unstable; urgency=high

  * Build against kernel-patch-2.6.7-ia64 (2.6.7-2), which includes
    an sn console update.
  * Build against kernel-tree-2.6.7-2

 -- dann frazier <dannf@debian.org>  Tue, 29 Jun 2004 13:30:22 -0600

kernel-image-2.6.7-ia64 (2.6.7-1) unstable; urgency=high

  * New upstream release.
  * Turn on SGI_L1_SERIAL_CONSOLE for SMP builds

 -- dann frazier <dannf@debian.org>  Mon, 21 Jun 2004 17:29:47 -0600

kernel-image-2.6.6-ia64 (2.6.6-3) unstable; urgency=high

  * Build against kernel-patch-2.4.26-ia64 (2.4.26-3), which reverts the
    sym53c8xx_2 driver to the 2.6.5 version.

 -- dann frazier <dannf@debian.org>  Wed, 09 Jun 2004 22:49:33 -0600

kernel-image-2.6.6-ia64 (2.6.6-2) unstable; urgency=high

  * SECURITY: Build against kernel-patch-2.4.26-ia64 (2.4.26-2), which includes
    a fix for a potential floating point information leak.

 -- dann frazier <dannf@debian.org>  Tue, 08 Jun 2004 21:42:21 -0600

kernel-image-2.6.6-ia64 (2.6.6-1) unstable; urgency=low

  * New upstream release

 -- dann frazier <dannf@debian.org>  Fri, 28 May 2004 21:34:24 -0600

kernel-image-2.6.5-ia64 (2.6.5-2) unstable; urgency=low

  * Build against kernel-tree-2.6.5-4

 -- dann frazier <dannf@debian.org>  Wed, 05 May 2004 00:43:06 -0600

kernel-image-2.6.5-ia64 (2.6.5-1) unstable; urgency=low

  * new upstream release

 -- dann frazier <dannf@debian.org>  Sun, 11 Apr 2004 20:37:38 -0600

kernel-image-2.6.4-ia64 (2.6.4-1) unstable; urgency=low

  * new upstream release

 -- dann frazier <dannf@debian.org>  Mon, 15 Mar 2004 23:56:01 -0700

kernel-image-2.6.3-ia64 (2.6.3-3) unstable; urgency=high

  * Build against kernel-patch-2.6.3-ia64-2.6.3-2, which contains
    a patch for a potential data corruption bug.

 -- dann frazier <dannf@debian.org>  Sat, 28 Feb 2004 11:20:41 -0700

kernel-image-2.6.3-ia64 (2.6.3-2) unstable; urgency=low

  * statically link 8250 for serial consoles
  * build against kernel-tree-2.6.3-2

 -- dann frazier <dannf@debian.org>  Mon, 23 Feb 2004 17:13:38 -0700

kernel-image-2.6.3-ia64 (2.6.3-1) unstable; urgency=low

  * new upstream release

 -- dann frazier <dannf@debian.org>  Sun, 22 Feb 2004 20:30:22 -0700

kernel-image-2.6.2-ia64 (2.6.2-1) unstable; urgency=low

  * new upstream release (thanks to jbailey for the .config)

 -- dann frazier <dannf@debian.org>  Wed, 11 Feb 2004 19:16:13 -0700

kernel-image-2.4.24-ia64 (2.4.24-2) unstable; urgency=low

  * build against kernel-tree-2.4.24-2
  * provide kernel-image-2.4 (thanks to jbailey for noticing its absence)

 -- dann frazier <dannf@debian.org>  Tue, 10 Feb 2004 12:04:15 -0700

kernel-image-2.4.24-ia64 (2.4.24-1) unstable; urgency=high

  * initial release

 -- dann frazier <dannf@debian.org>  Sat, 24 Jan 2004 22:10:52 -0700

kernel-image-2.4.22-ia64 (2.4.22-7.1) unstable; urgency=high

  * NMU
  * SECURITY: build against kernel-patch-2.4.22-ia64_2.4.22-7.1 (mremap fix)
    Closes: #225710
  * SECURITY: build against kernel-tree-2.4.22-5 (do_brk fix)
  * turn off CONFIG_SYM53C8XX, in favor of the v2 version of the driver.
    Closes: #225944
  * turn on CONFIG_DRM_RADEON=m
  * add dependency on initrd-tools
  * add elilo to Suggests

 -- dann frazier <dannf@debian.org>  Tue, 18 Nov 2003 14:43:39 -0700

kernel-image-2.4.22-ia64 (2.4.22-7) unstable; urgency=low

  * build-dep on kernel-tree instead of kernel-source
  * split kernel-patch into a separate package
  * build the input drivers as modules

 -- dann frazier <dannf@debian.org>  Tue, 18 Nov 2003 14:43:39 -0700

kernel-patch-2.4.22-ia64 (2.4.22-6) unstable; urgency=low

  * add ni_syscall_hush.patch - silences complaints about non existant
    syscalls.  See #219512.

 -- dann frazier <dannf@debian.org>  Thu, 13 Nov 2003 22:01:22 -0700

kernel-patch-2.4.22-ia64 (2.4.22-5) unstable; urgency=low

  * add a skeleton offsets.h patch.  works around a circular dependency
    (print_offsets.c -> ptrace.h -> offsets.h -> print_offsets.c)

 -- dann frazier <dannf@debian.org>  Wed, 12 Nov 2003 19:14:53 -0700

kernel-patch-2.4.22-ia64 (2.4.22-4) unstable; urgency=low

  * turn off NUMA support, breaks on some HP machines

 -- dann frazier <dannf@debian.org>  Sun, 02 Nov 2003 17:43:32 -0700

kernel-patch-2.4.22-ia64 (2.4.22-3) unstable; urgency=low

  * turn on magic sysrq
  * turn off CONFIG_E100, which will oops

 -- dann frazier <dannf@dannf.org>  Sun, 26 Oct 2003 15:20:43 -0700

kernel-patch-2.4.22-ia64 (2.4.22-2) unstable; urgency=low

  * turn on devfs support in all kernels
  * build w/ --initrd support
  * remove udeb bits

 -- dann frazier <dannf@dannf.org>  Sat, 25 Oct 2003 15:45:58 -0600

kernel-patch-2.4.22-ia64 (2.4.22-1) unstable; urgency=low

  * a 2.4.22 build

 -- dann frazier <dannf@dannf.org>  Mon, 13 Oct 2003 21:39:21 -0600

kernel-patch-2.4.20-ia64 (021210.em20.4) unstable; urgency=low

  * add ide-probe-mod to ide-modules, closes: #212328
  * ifdef out the CONFIG_TR definition to avoid polluting userspace
    includes, closes #210359
  * update cciss driver - increases card support & fixes a bug that
    affects newer ia64 platforms
  * added myself as an uploader

 -- dann frazier <dannf@dannf.org>  Mon, 13 Oct 2003 20:57:30 -0600

kernel-patch-2.4.20-ia64 (021210.em20.3) unstable; urgency=low

  * add devfs to kernel used by d-i, closes: #210352
  * remove bogus dependency in udeb builds from debian/rules, closes: #201065
  * change autofs to modules, closes: #203513
  * pick up perfmon task pinning fix for system-wide monitoring in SMP 
    systems, closes: #197983

 -- Bdale Garbee <bdale@gag.com>  Thu, 11 Sep 2003 16:36:50 -0600

kernel-patch-2.4.20-ia64 (021210.em20.2) unstable; urgency=low

  * fresh build to pick up kernel-source-2.4.20 security updates

 -- Bdale Garbee <bdale@gag.com>  Fri, 15 Aug 2003 08:35:55 -0600

kernel-patch-2.4.20-ia64 (021210.em20.1) unstable; urgency=low

  * updated patch from HP, fixes problems with itanium-smp on i2000 and 
    updates support for serial ports on the remote management cards in HP
    systems, closes: #194371
  * update config files to enable CONFIG_HP_DIVA.

 -- Bdale Garbee <bdale@gag.com>  Tue, 10 Jun 2003 13:04:17 -0600

kernel-patch-2.4.20-ia64 (021210.em18.3) unstable; urgency=low

  * change config files to build raid devices into kernel not modules
  * pull pal.h patch forward from 2.4.19 tree to fix syntax errors due to 
    asm/pal.h inclusion by other headers, closes: #191114
  * force use of gcc-3.2 since gcc-3.3 isn't building ia64 kernels right now!

 -- Bdale Garbee <bdale@gag.com>  Mon,  2 Jun 2003 23:12:00 -0600

kernel-patch-2.4.20-ia64 (021210.em18.2) unstable; urgency=low

  * fix type in patching scripts, closes: #191161
  * fix duplicated patch, closes: #191164
  * enable CONFIG_SERIAL_ACPI, closes: #190583
  * enable QLA2XXX fibre channel driver

 -- Bdale Garbee <bdale@gag.com>  Wed, 30 Apr 2003 12:27:41 -0600

kernel-patch-2.4.20-ia64 (021210.em18.1) unstable; urgency=low

  * updated patchset from HP
  * fix typo in description field... this isn't for powerpc!  closes: #185427
  * enable CONFIG_IP_NF_NAT_LOCAL as a module per request from Ryan Bradetich
  * enable CONFIG_VLAN_8021Q as a module per request from Grant Grundler

 -- Bdale Garbee <bdale@gag.com>  Thu, 10 Apr 2003 11:10:00 -0600

kernel-patch-2.4.20-ia64 (021210.em6.1) unstable; urgency=low

  * new upstream kernel version, first instance of a kernel-patch package
    for ia64 instead of a full source package.  borrowing heavily from the
    powerpc version maintained by Daniel Jacobowitz <dan@debian.org>

 -- Bdale Garbee <bdale@gag.com>  Mon, 10 Mar 2003 16:32:19 -0700

