[kernel-sec-discuss] r597 - active

Dann Frazier dannf at costa.debian.org
Mon Sep 25 19:13:16 UTC 2006


Author: dannf
Date: 2006-09-25 19:13:15 +0000 (Mon, 25 Sep 2006)
New Revision: 597

Modified:
   active/00boilerplate
   active/CVE-2002-0704
   active/CVE-2004-0813
   active/CVE-2004-1190
   active/CVE-2004-2135
   active/CVE-2004-2136
   active/CVE-2004-2660
   active/CVE-2005-0109
   active/CVE-2005-0504
   active/CVE-2005-0977
   active/CVE-2005-1264
   active/CVE-2005-1265
   active/CVE-2005-2873
   active/CVE-2005-3044
   active/CVE-2005-3105
   active/CVE-2005-3527
   active/CVE-2005-3660
   active/CVE-2005-4440
   active/CVE-2005-4441
   active/CVE-2005-4798
   active/CVE-2006-1052
   active/CVE-2006-1343
   active/CVE-2006-1528
   active/CVE-2006-1855
   active/CVE-2006-1856
   active/CVE-2006-1862
   active/CVE-2006-2275
   active/CVE-2006-2444
   active/CVE-2006-2445
   active/CVE-2006-2446
   active/CVE-2006-2448
   active/CVE-2006-2629
   active/CVE-2006-2934
   active/CVE-2006-2935
   active/CVE-2006-2936
   active/CVE-2006-3468
   active/CVE-2006-3634
   active/CVE-2006-3745
   active/CVE-2006-4093
   active/CVE-2006-4145
   active/CVE-2006-4535
   active/CVE-2006-4538
   active/block-all-signals-race
Log:
2.6.17 is in etch now, stop tracking 2.6.16

Modified: active/00boilerplate
===================================================================
--- active/00boilerplate	2006-09-25 03:19:00 UTC (rev 596)
+++ active/00boilerplate	2006-09-25 19:13:15 UTC (rev 597)
@@ -5,7 +5,6 @@
 Notes: 
 Bugs: 
 upstream: 
-linux-2.6.16: 
 linux-2.6:
 2.6.8-sarge-security: 
 2.4.27-sarge-security:

Modified: active/CVE-2002-0704
===================================================================
--- active/CVE-2002-0704	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2002-0704	2006-09-25 19:13:15 UTC (rev 597)
@@ -41,7 +41,6 @@
  horms> problem on allong with upstream's 2.4 (~2.4.33-pre1)
 Bugs: 
 upstream: released (2.6.11)
-linux-2.6.16: N/A
 linux-2.6: N/A
 2.6.8-sarge-security: ignored (2.6.8-16sarge5)
 2.4.27-sarge-security: ignored (2.4.27-10sarge5)

Modified: active/CVE-2004-0813
===================================================================
--- active/CVE-2004-0813	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2004-0813	2006-09-25 19:13:15 UTC (rev 597)
@@ -21,7 +21,6 @@
 	https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133098
 Bugs: 
 upstream: fixed (2.6.10)
-linux-2.6.16: N/A
 linux-2.6: N/A
 2.6.8-sarge-security: released (2.6.8-14)
 2.4.27-sarge-security: ignored (2.4.27-10sarge3)

Modified: active/CVE-2004-1190
===================================================================
--- active/CVE-2004-1190	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2004-1190	2006-09-25 19:13:15 UTC (rev 597)
@@ -13,7 +13,6 @@
 Notes: 
 Bugs: 300162
 upstream: released (2.6.10)
-linux-2.6.16: N/A
 linux-2.6: N/A
 2.6.8-sarge-security: released (2.6.8-14) [scsi-ioctl-cmd-warned.dpatch, scsi-ioctl-remove-dup.dpatch, scsi-ioctl-permit.dpatch, SG_IO-cap.dpatch, SG_IO-safe-commands-2.dpatch, SG_IO-safe-commands-3.dpatch, SG_IO-safe-commands-5.dpatch]
 2.4.27-sarge-security: ignored (2.4.27-10sarge3)

Modified: active/CVE-2004-2135
===================================================================
--- active/CVE-2004-2135	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2004-2135	2006-09-25 19:13:15 UTC (rev 597)
@@ -17,7 +17,6 @@
  jmm> I'm marking all these N/A
 Bugs: 
 upstream: 
-linux-2.6.16: ignored (2.6.16-18)
 linux-2.6:
 2.6.8-sarge-security: ignored (2.6.8-16sarge5)
 2.4.27-sarge-security: N/A

Modified: active/CVE-2004-2136
===================================================================
--- active/CVE-2004-2136	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2004-2136	2006-09-25 19:13:15 UTC (rev 597)
@@ -13,7 +13,6 @@
  jmm> 2.4 doesn't have dm-crypt, though
 Bugs: 
 upstream: 
-linux-2.6.16: ignored (2.6.16-18)
 linux-2.6:
 2.6.8-sarge-security: ignored (2.6.8-16sarge5)
 2.4.27-sarge-security: N/A

Modified: active/CVE-2004-2660
===================================================================
--- active/CVE-2004-2660	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2004-2660	2006-09-25 19:13:15 UTC (rev 597)
@@ -11,7 +11,6 @@
  jmm> Vulnerable code not present in 2.4
 Bugs: 
 upstream: released (2.6.10)
-linux-2.6.16: N/A
 linux-2.6: N/A
 2.6.8-sarge-security: pending (2.6.8-16sarge5) [direct-io-write-mem-leak.dpatch]
 2.4.27-sarge-security: N/A

Modified: active/CVE-2005-0109
===================================================================
--- active/CVE-2005-0109	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-0109	2006-09-25 19:13:15 UTC (rev 597)
@@ -44,7 +44,6 @@
  jmm> What did other distributions like Red Hat, SuSE or OWL do?
 Bugs: 
 upstream: 
-linux-2.6.16: ignored (2.6.16-18)
 linux-2.6:
 2.6.8-sarge-security: ignored (2.6.8-16sarge5)
 2.4.27-sarge-security: ignored (2.4.27-10sarge5)

Modified: active/CVE-2005-0504
===================================================================
--- active/CVE-2005-0504	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-0504	2006-09-25 19:13:15 UTC (rev 597)
@@ -8,7 +8,6 @@
  dannf> still not upstream as of 2.6.18-rc4, i've poked upstream about it
 Bugs: 
 upstream: 
-linux-2.6.16: 
 linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-12) [030-moxa_user_copy_checking.dpatch]
 2.4.27-sarge-security: released (2.4.27-8) [125_moxa_bound_checking.diff]

Modified: active/CVE-2005-0977
===================================================================
--- active/CVE-2005-0977	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-0977	2006-09-25 19:13:15 UTC (rev 597)
@@ -14,7 +14,6 @@
  aren't in 2.4, so the port isn't trivial for me.
 Bugs: 303177
 upstream: released (2.6.11)
-linux-2.6.16: N/A
 linux-2.6: N/A
 2.6.8-sarge-security: released (2.6.8-16) [mm-shmem-truncate.dpatch]
 2.4.27-sarge-security: ignored (2.4.27-10sarge3)

Modified: active/CVE-2005-1264
===================================================================
--- active/CVE-2005-1264	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-1264	2006-09-25 19:13:15 UTC (rev 597)
@@ -18,7 +18,6 @@
  dannf> Code is very different in 2.4, don't know if its vulnerable
 Bugs: 
 upstream: released (2.6.11.10)
-linux-2.6.16: 
 linux-2.6: N/A
 2.6.8-sarge-security: released (2.6.8-16) [drivers-block-raw-ioctl.dpatch]
 2.4.27-sarge-security: ignored (2.4.27-10sarge3)

Modified: active/CVE-2005-1265
===================================================================
--- active/CVE-2005-1265	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-1265	2006-09-25 19:13:15 UTC (rev 597)
@@ -9,7 +9,6 @@
  dannf> Code is very different in 2.4; dunno if its vulnerable
 Bugs: 
 upstream: released (2.6.12)
-linux-2.6.16: N/A
 linux-2.6: N/A
 2.6.8-sarge-security: released (2.6.8-16sarge1) [mm-mmap-range-test.dpatch]
 2.4.27-sarge-security: ignored (2.4.27-10sarge4)

Modified: active/CVE-2005-2873
===================================================================
--- active/CVE-2005-2873	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-2873	2006-09-25 19:13:15 UTC (rev 597)
@@ -20,7 +20,6 @@
  jmm> There's now a complete rewrite by Patrick McHardy in 2.6.18
 upstream: released (2.6.18)
 Bugs: 332381, 332231, 332228
-linux-2.6.16: ignored (2.6.16-18)
 linux-2.6: needed
 2.6.8-sarge-security: ignored (2.6.8-16sarge5)
 2.4.27-sarge-security: ignored (2.4.27-10sarge4)

Modified: active/CVE-2005-3044
===================================================================
--- active/CVE-2005-3044	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-3044	2006-09-25 19:13:15 UTC (rev 597)
@@ -23,7 +23,6 @@
  micah> have two patches... if you look at them they look REALLY similar, but they aren't
  micah> dont be fooled
 upstream: released (2.6.13.2)
-linux-2.6.16: N/A
 linux-2.6: released (2.6.12-7, 2.6.13-1) [lost-fput-in-32bit-ioctl-on-x86-64.patch, linux-2.6.13.2.patch]
 2.6.8-sarge-security: released (2.6.8-16sarge2) [lost-fput-in-32bit-ioctl-on-x86-64.dpatch, lost-sockfd_put-in-32bit-compat-routing_ioctl.patch]
 2.4.27-sarge-security: ignored (2.4.27-10sarge4)

Modified: active/CVE-2005-3105
===================================================================
--- active/CVE-2005-3105	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-3105	2006-09-25 19:13:15 UTC (rev 597)
@@ -28,5 +28,4 @@
 upstream: 2.6.12
 2.6.8-sarge-security: released (2.6.8-16sarge1) [mckinley_icache.dpatch]
 2.4.27-sarge-security: ignored (2.4.27-10sarge3)
-linux-2.6.16: N/A
 linux-2.6: N/A

Modified: active/CVE-2005-3527
===================================================================
--- active/CVE-2005-3527	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-3527	2006-09-25 19:13:15 UTC (rev 597)
@@ -27,7 +27,6 @@
 	backporting is too hard for the same reasons as 2.6.8.
 Bugs: 
 upstream: released (2.6.14)
-linux-2.6.16: N/A
 linux-2.6: N/A
 2.6.8-sarge-security: ignored (2.6.8-16sarge5)
 2.4.27-sarge-security: ignored (2.4.27-10sarge5)

Modified: active/CVE-2005-3660
===================================================================
--- active/CVE-2005-3660	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-3660	2006-09-25 19:13:15 UTC (rev 597)
@@ -14,7 +14,6 @@
  dannf> to struct file.  No such thing has gone upstream yet, however.
 Bugs: 
 upstream:
-linux-2.6.16: ignored (2.6.16-18)
 linux-2.6: 
 2.6.8-sarge-security: ignored (2.6.8-16sarge5)
 2.4.27-sarge-security: ignored (2.4.27-10sarge4)

Modified: active/CVE-2005-4440
===================================================================
--- active/CVE-2005-4440	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-4440	2006-09-25 19:13:15 UTC (rev 597)
@@ -34,7 +34,6 @@
  dannf> series of kernels & follow what upstream does.
 Bugs: 
 upstream: 
-linux-2.6.16: ignored (2.6.16-18)
 linux-2.6:
 2.6.8-sarge-security: ignored (2.6.8-16sarge5)
 2.4.27-sarge-security: ignored (2.4.27-10sarge4)

Modified: active/CVE-2005-4441
===================================================================
--- active/CVE-2005-4441	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-4441	2006-09-25 19:13:15 UTC (rev 597)
@@ -38,7 +38,6 @@
  dannf> series of kernels & follow what upstream does.
 Bugs: 
 upstream: 
-linux-2.6.16: ignored (2.6.16-18)
 linux-2.6:
 2.6.8-sarge-security: ignored (2.6.8-16sarge5)
 2.4.27-sarge-security: ignored (2.4.27-10sarge4)

Modified: active/CVE-2005-4798
===================================================================
--- active/CVE-2005-4798	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-4798	2006-09-25 19:13:15 UTC (rev 597)
@@ -14,7 +14,6 @@
  dannf> 2.6.8 looks affected to me - including my shot at a fix...
 Bugs: 
 upstream: 
-linux-2.6.16: N/A
 linux-2.6: N/A
 2.6.8-sarge-security: pending (2.6.8-16sarge5) [nfs-handle-long-symlinks.dpatch]
 2.4.27-sarge-security: pending (2.4.27-10sarge4) [223_nfs-handle-long-symlinks.diff]

Modified: active/CVE-2006-1052
===================================================================
--- active/CVE-2006-1052	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-1052	2006-09-25 19:13:15 UTC (rev 597)
@@ -10,7 +10,6 @@
 Notes: 
 Bugs: 
 upstream: released (2.6.16)
-linux-2.6.16: released (2.6.16-1)
 linux-2.6: released (2.6.16-1)
 2.6.8-sarge-security: pending (2.6.8-16sarge5) [selinux-tracer-SID-fix.dpatch]
 2.4.27-sarge-security: N/A

Modified: active/CVE-2006-1343
===================================================================
--- active/CVE-2006-1343	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-1343	2006-09-25 19:13:15 UTC (rev 597)
@@ -13,7 +13,6 @@
  jmm> It's now fixed upstream in 2.6 as well, let's include it in sarge4
 Bugs: 
 upstream: released (2.4.33-pre3), released (2.6.16.19)
-linux-2.6.16: released (2.6.16-15)
 linux-2.6: released (2.6.16-15)
 2.6.8-sarge-security: pending (2.6.8-16sarge5) [netfilter-SO_ORIGINAL_DST-leak.dpatch]
 2.4.27-sarge-security: released (2.4.27-10sarge3) [212_ipv4-sin_zero_clear.diff]

Modified: active/CVE-2006-1528
===================================================================
--- active/CVE-2006-1528	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-1528	2006-09-25 19:13:15 UTC (rev 597)
@@ -9,7 +9,6 @@
 Notes: 
 Bugs: 
 upstream: released (2.6.13), released (2.4.33.1) 
-linux-2.6.16: N/A
 linux-2.6: released (2.6.13-1)
 2.6.8-sarge-security: pending (2.6.8-16sarge5)
 2.4.27-sarge-security: pending (2.4.27-10sarge4)

Modified: active/CVE-2006-1855
===================================================================
--- active/CVE-2006-1855	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-1855	2006-09-25 19:13:15 UTC (rev 597)
@@ -11,7 +11,6 @@
  jmm> Vulnerable code not present in 2.4.27
 Bugs: 
 upstream: released (2.6.11.12)
-linux-2.6.16: N/A
 linux-2.6: N/A
 2.6.8-sarge-security: pending (2.6.8-16sarge5)
 2.4.27-sarge-security: N/A

Modified: active/CVE-2006-1856
===================================================================
--- active/CVE-2006-1856	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-1856	2006-09-25 19:13:15 UTC (rev 597)
@@ -11,7 +11,6 @@
 Notes:
 Bugs: 
 upstream: released (2.6.17)
-linux-2.6.16: needed
 linux-2.6: released (2.6.17-1)
 2.6.8-sarge-security: pending (2.6.8-16sarge5)
 2.4.27-sarge-security: N/A

Modified: active/CVE-2006-1862
===================================================================
--- active/CVE-2006-1862	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-1862	2006-09-25 19:13:15 UTC (rev 597)
@@ -12,7 +12,6 @@
  dannf>  https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189031
 Bugs: 
 upstream: 
-linux-2.6.16: N/A
 linux-2.6: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A

Modified: active/CVE-2006-2275
===================================================================
--- active/CVE-2006-2275	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-2275	2006-09-25 19:13:15 UTC (rev 597)
@@ -12,7 +12,6 @@
  jmm> be postponed for now
 Bugs: 
 upstream: released (2.6.16.15)
-linux-2.6.16: released (2.6.16-13)
 linux-2.6: released (2.6.16-13)
 2.6.8-sarge-security: ignored (2.6.8-16sarge4) 
 2.4.27-sarge-security: ignored (2.4.27-10sarge4)

Modified: active/CVE-2006-2444
===================================================================
--- active/CVE-2006-2444	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-2444	2006-09-25 19:13:15 UTC (rev 597)
@@ -12,7 +12,6 @@
 Notes: 
 Bugs: 
 upstream: released (2.6.16.18)
-linux-2.6.16: released (2.6.16-15)
 linux-2.6: released (2.6.16-15)
 2.6.8-sarge-security: pending (2.6.8-16sarge5) [snmp-nat-mem-corruption-fix.dpatch]
 2.4.27-sarge-security: pending (2.4.27-10sarge4) [226_snmp-nat-mem-corruption-fix.diff]

Modified: active/CVE-2006-2445
===================================================================
--- active/CVE-2006-2445	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-2445	2006-09-25 19:13:15 UTC (rev 597)
@@ -16,7 +16,6 @@
  mpitt> 2.6.10-hoary does not need 4th GIT patch, function does not exist
 Bugs: 
 upstream: released (2.6.16.21)
-linux-2.6.16: released (2.6.16-15)
 linux-2.6: released (2.6.16-15)
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A

Modified: active/CVE-2006-2446
===================================================================
--- active/CVE-2006-2446	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-2446	2006-09-25 19:13:15 UTC (rev 597)
@@ -15,7 +15,6 @@
 Notes: 
 Bugs: 
 upstream: 
-linux-2.6.16: 
 linux-2.6:
 2.6.8-sarge-security: pending (2.6.8-16sarge5) [kfree_skb-race.dpatch]
 2.4.27-sarge-security: pending (2.4.27-10sarge4) [227_kfree_skb.diff]

Modified: active/CVE-2006-2448
===================================================================
--- active/CVE-2006-2448	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-2448	2006-09-25 19:13:15 UTC (rev 597)
@@ -12,7 +12,6 @@
         if this fix is needed or how to apply it.
 Bugs: 
 upstream: released (2.6.16.21)
-linux-2.6.16: released (2.6.16-15)
 linux-2.6: released (2.6.16-15)
 2.6.8-sarge-security: ignored (2.6.8-16sarge5)
 2.4.27-sarge-security: ignored (2.4.27-10sarge4)

Modified: active/CVE-2006-2629
===================================================================
--- active/CVE-2006-2629	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-2629	2006-09-25 19:13:15 UTC (rev 597)
@@ -12,7 +12,6 @@
  dannf> marking sarge kernels N/A because they are < 2.6.15
 Bugs: 
 upstream: 
-linux-2.6.16: 
 linux-2.6: 
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A

Modified: active/CVE-2006-2934
===================================================================
--- active/CVE-2006-2934	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-2934	2006-09-25 19:13:15 UTC (rev 597)
@@ -15,7 +15,6 @@
  netfilter/sctp didn't exist in 2.6.8/2.4.27
 Bugs: 
 upstream: released (2.6.16.23, 2.6.17.3)
-linux-2.6.16: released (2.6.16-17)
 linux-2.6: released (2.6.17-3)
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A

Modified: active/CVE-2006-2935
===================================================================
--- active/CVE-2006-2935	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-2935	2006-09-25 19:13:15 UTC (rev 597)
@@ -16,7 +16,6 @@
  dannf> Submitted to Adrian Bunk for inclusion in 2.6.16.y
 Bugs: 
 upstream: released (2.6.17.7)
-linux-2.6.16: pending (2.6.16-18) [cdrom-bad-cgc.buflen-assign.patch]
 linux-2.6: released (2.6.17-5)
 2.6.8-sarge-security: pending (2.6.8-16sarge5) [cdrom-bad-cgc.buflen-assign.dpatch]
 2.4.27-sarge-security: pending (2.4.27-10sarge4) [224_cdrom-bad-cgc.buflen-assign.diff]

Modified: active/CVE-2006-2936
===================================================================
--- active/CVE-2006-2936	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-2936	2006-09-25 19:13:15 UTC (rev 597)
@@ -15,7 +15,6 @@
  jmm> 2.4 not affected due to different memory allocation
 Bugs: 
 upstream: released (2.6.16.26, 2.6.17.7)
-linux-2.6.16: pending (2.6.16-18)
 linux-2.6: released (2.6.17-5)
 2.6.8-sarge-security: pending (2.6.8-16sarge5)
 2.4.27-sarge-security: N/A

Modified: active/CVE-2006-3468
===================================================================
--- active/CVE-2006-3468	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-3468	2006-09-25 19:13:15 UTC (rev 597)
@@ -20,7 +20,6 @@
 Bugs: 
  https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=199172
 upstream: released (2.6.17.8, 2.6.18-rc4)
-linux-2.6.16: pending (2.6.16-18) [fs-ext3-bad-nfs-handle.patch]
 linux-2.6: needed
 2.6.8-sarge-security: pending (2.6.8-16sarge5) [fs-ext3-bad-nfs-handle.dpatch]
 2.4.27-sarge-security: ignored (2.4.27-10sarge4)

Modified: active/CVE-2006-3634
===================================================================
--- active/CVE-2006-3634	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-3634	2006-09-25 19:13:15 UTC (rev 597)
@@ -12,7 +12,6 @@
  dannf> s390 didn't have a futex.h until after 2.6.16
 Bugs: 
 upstream: released (2.6.18-rc2)
-linux-2.6.16: N/A
 linux-2.6: released (2.6.17-1)
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A

Modified: active/CVE-2006-3745
===================================================================
--- active/CVE-2006-3745	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-3745	2006-09-25 19:13:15 UTC (rev 597)
@@ -11,7 +11,6 @@
 Notes: 
 Bugs: 
 upstream: released (2.6.18-rc5)
-linux-2.6.16: needed
 linux-2.6: released (2.6.17-7)
 2.6.8-sarge-security: pending (2.6.8-16sarge5) [sctp-priv-elevation.dpatch, sctp-priv-elevation-2.dpatch]
 2.4.27-sarge-security: pending (2.4.27-10sarge4) [228_sctp-priv-elevation.diff, 228_sctp-priv-elevation-2.diff]

Modified: active/CVE-2006-4093
===================================================================
--- active/CVE-2006-4093	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-4093	2006-09-25 19:13:15 UTC (rev 597)
@@ -10,7 +10,6 @@
 Notes: 
 Bugs: 
 upstream: released (2.4.33.1), released (2.6.17.9), released (2.6.18-rc5)
-linux-2.6.16: needed
 linux-2.6: needed
 2.6.8-sarge-security: pending (2.6.8-16sarge5) [ppc-hid0-dos.dpatch]
 2.4.27-sarge-security: needed

Modified: active/CVE-2006-4145
===================================================================
--- active/CVE-2006-4145	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-4145	2006-09-25 19:13:15 UTC (rev 597)
@@ -11,7 +11,6 @@
  dannf> Submitted upstream on 2006.08.27
 Bugs: 
 upstream: released (2.6.17.10), released (2.6.18-rc5)
-linux-2.6.16: needed
 linux-2.6: released (2.6.17-7)
 2.6.8-sarge-security: pending (2.6.8-16sarge5)
 2.4.27-sarge-security: pending (2.4.27-10sarge4)

Modified: active/CVE-2006-4535
===================================================================
--- active/CVE-2006-4535	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-4535	2006-09-25 19:13:15 UTC (rev 597)
@@ -11,7 +11,6 @@
 Notes: 
 Bugs: 
 upstream: released (2.6.18-rc6)
-linux-2.6.16: needed
 linux-2.6: released (2.6.18-1)
 2.6.8-sarge-security: pending (2.6.8-16sarge5)
 2.4.27-sarge-security: pending (2.4.27-10sarge4)

Modified: active/CVE-2006-4538
===================================================================
--- active/CVE-2006-4538	2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-4538	2006-09-25 19:13:15 UTC (rev 597)
@@ -15,7 +15,6 @@
 Notes: 
 Bugs: 
 upstream: 
-linux-2.6.16: 
 linux-2.6:
 2.6.8-sarge-security: 
 2.4.27-sarge-security:

Modified: active/block-all-signals-race
===================================================================
--- active/block-all-signals-race	2006-09-25 03:19:00 UTC (rev 596)
+++ active/block-all-signals-race	2006-09-25 19:13:15 UTC (rev 597)
@@ -10,7 +10,6 @@
 Notes: 
 Bugs: 
 upstream: 
-linux-2.6.16:
 linux-2.6: pending (2.6.15.5)
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 




More information about the kernel-sec-discuss mailing list