[kernel-sec-discuss] r597 - active
Dann Frazier
dannf at costa.debian.org
Mon Sep 25 19:13:16 UTC 2006
Author: dannf
Date: 2006-09-25 19:13:15 +0000 (Mon, 25 Sep 2006)
New Revision: 597
Modified:
active/00boilerplate
active/CVE-2002-0704
active/CVE-2004-0813
active/CVE-2004-1190
active/CVE-2004-2135
active/CVE-2004-2136
active/CVE-2004-2660
active/CVE-2005-0109
active/CVE-2005-0504
active/CVE-2005-0977
active/CVE-2005-1264
active/CVE-2005-1265
active/CVE-2005-2873
active/CVE-2005-3044
active/CVE-2005-3105
active/CVE-2005-3527
active/CVE-2005-3660
active/CVE-2005-4440
active/CVE-2005-4441
active/CVE-2005-4798
active/CVE-2006-1052
active/CVE-2006-1343
active/CVE-2006-1528
active/CVE-2006-1855
active/CVE-2006-1856
active/CVE-2006-1862
active/CVE-2006-2275
active/CVE-2006-2444
active/CVE-2006-2445
active/CVE-2006-2446
active/CVE-2006-2448
active/CVE-2006-2629
active/CVE-2006-2934
active/CVE-2006-2935
active/CVE-2006-2936
active/CVE-2006-3468
active/CVE-2006-3634
active/CVE-2006-3745
active/CVE-2006-4093
active/CVE-2006-4145
active/CVE-2006-4535
active/CVE-2006-4538
active/block-all-signals-race
Log:
2.6.17 is in etch now, stop tracking 2.6.16
Modified: active/00boilerplate
===================================================================
--- active/00boilerplate 2006-09-25 03:19:00 UTC (rev 596)
+++ active/00boilerplate 2006-09-25 19:13:15 UTC (rev 597)
@@ -5,7 +5,6 @@
Notes:
Bugs:
upstream:
-linux-2.6.16:
linux-2.6:
2.6.8-sarge-security:
2.4.27-sarge-security:
Modified: active/CVE-2002-0704
===================================================================
--- active/CVE-2002-0704 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2002-0704 2006-09-25 19:13:15 UTC (rev 597)
@@ -41,7 +41,6 @@
horms> problem on allong with upstream's 2.4 (~2.4.33-pre1)
Bugs:
upstream: released (2.6.11)
-linux-2.6.16: N/A
linux-2.6: N/A
2.6.8-sarge-security: ignored (2.6.8-16sarge5)
2.4.27-sarge-security: ignored (2.4.27-10sarge5)
Modified: active/CVE-2004-0813
===================================================================
--- active/CVE-2004-0813 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2004-0813 2006-09-25 19:13:15 UTC (rev 597)
@@ -21,7 +21,6 @@
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133098
Bugs:
upstream: fixed (2.6.10)
-linux-2.6.16: N/A
linux-2.6: N/A
2.6.8-sarge-security: released (2.6.8-14)
2.4.27-sarge-security: ignored (2.4.27-10sarge3)
Modified: active/CVE-2004-1190
===================================================================
--- active/CVE-2004-1190 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2004-1190 2006-09-25 19:13:15 UTC (rev 597)
@@ -13,7 +13,6 @@
Notes:
Bugs: 300162
upstream: released (2.6.10)
-linux-2.6.16: N/A
linux-2.6: N/A
2.6.8-sarge-security: released (2.6.8-14) [scsi-ioctl-cmd-warned.dpatch, scsi-ioctl-remove-dup.dpatch, scsi-ioctl-permit.dpatch, SG_IO-cap.dpatch, SG_IO-safe-commands-2.dpatch, SG_IO-safe-commands-3.dpatch, SG_IO-safe-commands-5.dpatch]
2.4.27-sarge-security: ignored (2.4.27-10sarge3)
Modified: active/CVE-2004-2135
===================================================================
--- active/CVE-2004-2135 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2004-2135 2006-09-25 19:13:15 UTC (rev 597)
@@ -17,7 +17,6 @@
jmm> I'm marking all these N/A
Bugs:
upstream:
-linux-2.6.16: ignored (2.6.16-18)
linux-2.6:
2.6.8-sarge-security: ignored (2.6.8-16sarge5)
2.4.27-sarge-security: N/A
Modified: active/CVE-2004-2136
===================================================================
--- active/CVE-2004-2136 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2004-2136 2006-09-25 19:13:15 UTC (rev 597)
@@ -13,7 +13,6 @@
jmm> 2.4 doesn't have dm-crypt, though
Bugs:
upstream:
-linux-2.6.16: ignored (2.6.16-18)
linux-2.6:
2.6.8-sarge-security: ignored (2.6.8-16sarge5)
2.4.27-sarge-security: N/A
Modified: active/CVE-2004-2660
===================================================================
--- active/CVE-2004-2660 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2004-2660 2006-09-25 19:13:15 UTC (rev 597)
@@ -11,7 +11,6 @@
jmm> Vulnerable code not present in 2.4
Bugs:
upstream: released (2.6.10)
-linux-2.6.16: N/A
linux-2.6: N/A
2.6.8-sarge-security: pending (2.6.8-16sarge5) [direct-io-write-mem-leak.dpatch]
2.4.27-sarge-security: N/A
Modified: active/CVE-2005-0109
===================================================================
--- active/CVE-2005-0109 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-0109 2006-09-25 19:13:15 UTC (rev 597)
@@ -44,7 +44,6 @@
jmm> What did other distributions like Red Hat, SuSE or OWL do?
Bugs:
upstream:
-linux-2.6.16: ignored (2.6.16-18)
linux-2.6:
2.6.8-sarge-security: ignored (2.6.8-16sarge5)
2.4.27-sarge-security: ignored (2.4.27-10sarge5)
Modified: active/CVE-2005-0504
===================================================================
--- active/CVE-2005-0504 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-0504 2006-09-25 19:13:15 UTC (rev 597)
@@ -8,7 +8,6 @@
dannf> still not upstream as of 2.6.18-rc4, i've poked upstream about it
Bugs:
upstream:
-linux-2.6.16:
linux-2.6:
2.6.8-sarge-security: released (2.6.8-12) [030-moxa_user_copy_checking.dpatch]
2.4.27-sarge-security: released (2.4.27-8) [125_moxa_bound_checking.diff]
Modified: active/CVE-2005-0977
===================================================================
--- active/CVE-2005-0977 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-0977 2006-09-25 19:13:15 UTC (rev 597)
@@ -14,7 +14,6 @@
aren't in 2.4, so the port isn't trivial for me.
Bugs: 303177
upstream: released (2.6.11)
-linux-2.6.16: N/A
linux-2.6: N/A
2.6.8-sarge-security: released (2.6.8-16) [mm-shmem-truncate.dpatch]
2.4.27-sarge-security: ignored (2.4.27-10sarge3)
Modified: active/CVE-2005-1264
===================================================================
--- active/CVE-2005-1264 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-1264 2006-09-25 19:13:15 UTC (rev 597)
@@ -18,7 +18,6 @@
dannf> Code is very different in 2.4, don't know if its vulnerable
Bugs:
upstream: released (2.6.11.10)
-linux-2.6.16:
linux-2.6: N/A
2.6.8-sarge-security: released (2.6.8-16) [drivers-block-raw-ioctl.dpatch]
2.4.27-sarge-security: ignored (2.4.27-10sarge3)
Modified: active/CVE-2005-1265
===================================================================
--- active/CVE-2005-1265 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-1265 2006-09-25 19:13:15 UTC (rev 597)
@@ -9,7 +9,6 @@
dannf> Code is very different in 2.4; dunno if its vulnerable
Bugs:
upstream: released (2.6.12)
-linux-2.6.16: N/A
linux-2.6: N/A
2.6.8-sarge-security: released (2.6.8-16sarge1) [mm-mmap-range-test.dpatch]
2.4.27-sarge-security: ignored (2.4.27-10sarge4)
Modified: active/CVE-2005-2873
===================================================================
--- active/CVE-2005-2873 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-2873 2006-09-25 19:13:15 UTC (rev 597)
@@ -20,7 +20,6 @@
jmm> There's now a complete rewrite by Patrick McHardy in 2.6.18
upstream: released (2.6.18)
Bugs: 332381, 332231, 332228
-linux-2.6.16: ignored (2.6.16-18)
linux-2.6: needed
2.6.8-sarge-security: ignored (2.6.8-16sarge5)
2.4.27-sarge-security: ignored (2.4.27-10sarge4)
Modified: active/CVE-2005-3044
===================================================================
--- active/CVE-2005-3044 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-3044 2006-09-25 19:13:15 UTC (rev 597)
@@ -23,7 +23,6 @@
micah> have two patches... if you look at them they look REALLY similar, but they aren't
micah> dont be fooled
upstream: released (2.6.13.2)
-linux-2.6.16: N/A
linux-2.6: released (2.6.12-7, 2.6.13-1) [lost-fput-in-32bit-ioctl-on-x86-64.patch, linux-2.6.13.2.patch]
2.6.8-sarge-security: released (2.6.8-16sarge2) [lost-fput-in-32bit-ioctl-on-x86-64.dpatch, lost-sockfd_put-in-32bit-compat-routing_ioctl.patch]
2.4.27-sarge-security: ignored (2.4.27-10sarge4)
Modified: active/CVE-2005-3105
===================================================================
--- active/CVE-2005-3105 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-3105 2006-09-25 19:13:15 UTC (rev 597)
@@ -28,5 +28,4 @@
upstream: 2.6.12
2.6.8-sarge-security: released (2.6.8-16sarge1) [mckinley_icache.dpatch]
2.4.27-sarge-security: ignored (2.4.27-10sarge3)
-linux-2.6.16: N/A
linux-2.6: N/A
Modified: active/CVE-2005-3527
===================================================================
--- active/CVE-2005-3527 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-3527 2006-09-25 19:13:15 UTC (rev 597)
@@ -27,7 +27,6 @@
backporting is too hard for the same reasons as 2.6.8.
Bugs:
upstream: released (2.6.14)
-linux-2.6.16: N/A
linux-2.6: N/A
2.6.8-sarge-security: ignored (2.6.8-16sarge5)
2.4.27-sarge-security: ignored (2.4.27-10sarge5)
Modified: active/CVE-2005-3660
===================================================================
--- active/CVE-2005-3660 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-3660 2006-09-25 19:13:15 UTC (rev 597)
@@ -14,7 +14,6 @@
dannf> to struct file. No such thing has gone upstream yet, however.
Bugs:
upstream:
-linux-2.6.16: ignored (2.6.16-18)
linux-2.6:
2.6.8-sarge-security: ignored (2.6.8-16sarge5)
2.4.27-sarge-security: ignored (2.4.27-10sarge4)
Modified: active/CVE-2005-4440
===================================================================
--- active/CVE-2005-4440 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-4440 2006-09-25 19:13:15 UTC (rev 597)
@@ -34,7 +34,6 @@
dannf> series of kernels & follow what upstream does.
Bugs:
upstream:
-linux-2.6.16: ignored (2.6.16-18)
linux-2.6:
2.6.8-sarge-security: ignored (2.6.8-16sarge5)
2.4.27-sarge-security: ignored (2.4.27-10sarge4)
Modified: active/CVE-2005-4441
===================================================================
--- active/CVE-2005-4441 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-4441 2006-09-25 19:13:15 UTC (rev 597)
@@ -38,7 +38,6 @@
dannf> series of kernels & follow what upstream does.
Bugs:
upstream:
-linux-2.6.16: ignored (2.6.16-18)
linux-2.6:
2.6.8-sarge-security: ignored (2.6.8-16sarge5)
2.4.27-sarge-security: ignored (2.4.27-10sarge4)
Modified: active/CVE-2005-4798
===================================================================
--- active/CVE-2005-4798 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2005-4798 2006-09-25 19:13:15 UTC (rev 597)
@@ -14,7 +14,6 @@
dannf> 2.6.8 looks affected to me - including my shot at a fix...
Bugs:
upstream:
-linux-2.6.16: N/A
linux-2.6: N/A
2.6.8-sarge-security: pending (2.6.8-16sarge5) [nfs-handle-long-symlinks.dpatch]
2.4.27-sarge-security: pending (2.4.27-10sarge4) [223_nfs-handle-long-symlinks.diff]
Modified: active/CVE-2006-1052
===================================================================
--- active/CVE-2006-1052 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-1052 2006-09-25 19:13:15 UTC (rev 597)
@@ -10,7 +10,6 @@
Notes:
Bugs:
upstream: released (2.6.16)
-linux-2.6.16: released (2.6.16-1)
linux-2.6: released (2.6.16-1)
2.6.8-sarge-security: pending (2.6.8-16sarge5) [selinux-tracer-SID-fix.dpatch]
2.4.27-sarge-security: N/A
Modified: active/CVE-2006-1343
===================================================================
--- active/CVE-2006-1343 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-1343 2006-09-25 19:13:15 UTC (rev 597)
@@ -13,7 +13,6 @@
jmm> It's now fixed upstream in 2.6 as well, let's include it in sarge4
Bugs:
upstream: released (2.4.33-pre3), released (2.6.16.19)
-linux-2.6.16: released (2.6.16-15)
linux-2.6: released (2.6.16-15)
2.6.8-sarge-security: pending (2.6.8-16sarge5) [netfilter-SO_ORIGINAL_DST-leak.dpatch]
2.4.27-sarge-security: released (2.4.27-10sarge3) [212_ipv4-sin_zero_clear.diff]
Modified: active/CVE-2006-1528
===================================================================
--- active/CVE-2006-1528 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-1528 2006-09-25 19:13:15 UTC (rev 597)
@@ -9,7 +9,6 @@
Notes:
Bugs:
upstream: released (2.6.13), released (2.4.33.1)
-linux-2.6.16: N/A
linux-2.6: released (2.6.13-1)
2.6.8-sarge-security: pending (2.6.8-16sarge5)
2.4.27-sarge-security: pending (2.4.27-10sarge4)
Modified: active/CVE-2006-1855
===================================================================
--- active/CVE-2006-1855 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-1855 2006-09-25 19:13:15 UTC (rev 597)
@@ -11,7 +11,6 @@
jmm> Vulnerable code not present in 2.4.27
Bugs:
upstream: released (2.6.11.12)
-linux-2.6.16: N/A
linux-2.6: N/A
2.6.8-sarge-security: pending (2.6.8-16sarge5)
2.4.27-sarge-security: N/A
Modified: active/CVE-2006-1856
===================================================================
--- active/CVE-2006-1856 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-1856 2006-09-25 19:13:15 UTC (rev 597)
@@ -11,7 +11,6 @@
Notes:
Bugs:
upstream: released (2.6.17)
-linux-2.6.16: needed
linux-2.6: released (2.6.17-1)
2.6.8-sarge-security: pending (2.6.8-16sarge5)
2.4.27-sarge-security: N/A
Modified: active/CVE-2006-1862
===================================================================
--- active/CVE-2006-1862 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-1862 2006-09-25 19:13:15 UTC (rev 597)
@@ -12,7 +12,6 @@
dannf> https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189031
Bugs:
upstream:
-linux-2.6.16: N/A
linux-2.6: N/A
2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
Modified: active/CVE-2006-2275
===================================================================
--- active/CVE-2006-2275 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-2275 2006-09-25 19:13:15 UTC (rev 597)
@@ -12,7 +12,6 @@
jmm> be postponed for now
Bugs:
upstream: released (2.6.16.15)
-linux-2.6.16: released (2.6.16-13)
linux-2.6: released (2.6.16-13)
2.6.8-sarge-security: ignored (2.6.8-16sarge4)
2.4.27-sarge-security: ignored (2.4.27-10sarge4)
Modified: active/CVE-2006-2444
===================================================================
--- active/CVE-2006-2444 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-2444 2006-09-25 19:13:15 UTC (rev 597)
@@ -12,7 +12,6 @@
Notes:
Bugs:
upstream: released (2.6.16.18)
-linux-2.6.16: released (2.6.16-15)
linux-2.6: released (2.6.16-15)
2.6.8-sarge-security: pending (2.6.8-16sarge5) [snmp-nat-mem-corruption-fix.dpatch]
2.4.27-sarge-security: pending (2.4.27-10sarge4) [226_snmp-nat-mem-corruption-fix.diff]
Modified: active/CVE-2006-2445
===================================================================
--- active/CVE-2006-2445 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-2445 2006-09-25 19:13:15 UTC (rev 597)
@@ -16,7 +16,6 @@
mpitt> 2.6.10-hoary does not need 4th GIT patch, function does not exist
Bugs:
upstream: released (2.6.16.21)
-linux-2.6.16: released (2.6.16-15)
linux-2.6: released (2.6.16-15)
2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
Modified: active/CVE-2006-2446
===================================================================
--- active/CVE-2006-2446 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-2446 2006-09-25 19:13:15 UTC (rev 597)
@@ -15,7 +15,6 @@
Notes:
Bugs:
upstream:
-linux-2.6.16:
linux-2.6:
2.6.8-sarge-security: pending (2.6.8-16sarge5) [kfree_skb-race.dpatch]
2.4.27-sarge-security: pending (2.4.27-10sarge4) [227_kfree_skb.diff]
Modified: active/CVE-2006-2448
===================================================================
--- active/CVE-2006-2448 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-2448 2006-09-25 19:13:15 UTC (rev 597)
@@ -12,7 +12,6 @@
if this fix is needed or how to apply it.
Bugs:
upstream: released (2.6.16.21)
-linux-2.6.16: released (2.6.16-15)
linux-2.6: released (2.6.16-15)
2.6.8-sarge-security: ignored (2.6.8-16sarge5)
2.4.27-sarge-security: ignored (2.4.27-10sarge4)
Modified: active/CVE-2006-2629
===================================================================
--- active/CVE-2006-2629 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-2629 2006-09-25 19:13:15 UTC (rev 597)
@@ -12,7 +12,6 @@
dannf> marking sarge kernels N/A because they are < 2.6.15
Bugs:
upstream:
-linux-2.6.16:
linux-2.6:
2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
Modified: active/CVE-2006-2934
===================================================================
--- active/CVE-2006-2934 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-2934 2006-09-25 19:13:15 UTC (rev 597)
@@ -15,7 +15,6 @@
netfilter/sctp didn't exist in 2.6.8/2.4.27
Bugs:
upstream: released (2.6.16.23, 2.6.17.3)
-linux-2.6.16: released (2.6.16-17)
linux-2.6: released (2.6.17-3)
2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
Modified: active/CVE-2006-2935
===================================================================
--- active/CVE-2006-2935 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-2935 2006-09-25 19:13:15 UTC (rev 597)
@@ -16,7 +16,6 @@
dannf> Submitted to Adrian Bunk for inclusion in 2.6.16.y
Bugs:
upstream: released (2.6.17.7)
-linux-2.6.16: pending (2.6.16-18) [cdrom-bad-cgc.buflen-assign.patch]
linux-2.6: released (2.6.17-5)
2.6.8-sarge-security: pending (2.6.8-16sarge5) [cdrom-bad-cgc.buflen-assign.dpatch]
2.4.27-sarge-security: pending (2.4.27-10sarge4) [224_cdrom-bad-cgc.buflen-assign.diff]
Modified: active/CVE-2006-2936
===================================================================
--- active/CVE-2006-2936 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-2936 2006-09-25 19:13:15 UTC (rev 597)
@@ -15,7 +15,6 @@
jmm> 2.4 not affected due to different memory allocation
Bugs:
upstream: released (2.6.16.26, 2.6.17.7)
-linux-2.6.16: pending (2.6.16-18)
linux-2.6: released (2.6.17-5)
2.6.8-sarge-security: pending (2.6.8-16sarge5)
2.4.27-sarge-security: N/A
Modified: active/CVE-2006-3468
===================================================================
--- active/CVE-2006-3468 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-3468 2006-09-25 19:13:15 UTC (rev 597)
@@ -20,7 +20,6 @@
Bugs:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=199172
upstream: released (2.6.17.8, 2.6.18-rc4)
-linux-2.6.16: pending (2.6.16-18) [fs-ext3-bad-nfs-handle.patch]
linux-2.6: needed
2.6.8-sarge-security: pending (2.6.8-16sarge5) [fs-ext3-bad-nfs-handle.dpatch]
2.4.27-sarge-security: ignored (2.4.27-10sarge4)
Modified: active/CVE-2006-3634
===================================================================
--- active/CVE-2006-3634 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-3634 2006-09-25 19:13:15 UTC (rev 597)
@@ -12,7 +12,6 @@
dannf> s390 didn't have a futex.h until after 2.6.16
Bugs:
upstream: released (2.6.18-rc2)
-linux-2.6.16: N/A
linux-2.6: released (2.6.17-1)
2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
Modified: active/CVE-2006-3745
===================================================================
--- active/CVE-2006-3745 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-3745 2006-09-25 19:13:15 UTC (rev 597)
@@ -11,7 +11,6 @@
Notes:
Bugs:
upstream: released (2.6.18-rc5)
-linux-2.6.16: needed
linux-2.6: released (2.6.17-7)
2.6.8-sarge-security: pending (2.6.8-16sarge5) [sctp-priv-elevation.dpatch, sctp-priv-elevation-2.dpatch]
2.4.27-sarge-security: pending (2.4.27-10sarge4) [228_sctp-priv-elevation.diff, 228_sctp-priv-elevation-2.diff]
Modified: active/CVE-2006-4093
===================================================================
--- active/CVE-2006-4093 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-4093 2006-09-25 19:13:15 UTC (rev 597)
@@ -10,7 +10,6 @@
Notes:
Bugs:
upstream: released (2.4.33.1), released (2.6.17.9), released (2.6.18-rc5)
-linux-2.6.16: needed
linux-2.6: needed
2.6.8-sarge-security: pending (2.6.8-16sarge5) [ppc-hid0-dos.dpatch]
2.4.27-sarge-security: needed
Modified: active/CVE-2006-4145
===================================================================
--- active/CVE-2006-4145 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-4145 2006-09-25 19:13:15 UTC (rev 597)
@@ -11,7 +11,6 @@
dannf> Submitted upstream on 2006.08.27
Bugs:
upstream: released (2.6.17.10), released (2.6.18-rc5)
-linux-2.6.16: needed
linux-2.6: released (2.6.17-7)
2.6.8-sarge-security: pending (2.6.8-16sarge5)
2.4.27-sarge-security: pending (2.4.27-10sarge4)
Modified: active/CVE-2006-4535
===================================================================
--- active/CVE-2006-4535 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-4535 2006-09-25 19:13:15 UTC (rev 597)
@@ -11,7 +11,6 @@
Notes:
Bugs:
upstream: released (2.6.18-rc6)
-linux-2.6.16: needed
linux-2.6: released (2.6.18-1)
2.6.8-sarge-security: pending (2.6.8-16sarge5)
2.4.27-sarge-security: pending (2.4.27-10sarge4)
Modified: active/CVE-2006-4538
===================================================================
--- active/CVE-2006-4538 2006-09-25 03:19:00 UTC (rev 596)
+++ active/CVE-2006-4538 2006-09-25 19:13:15 UTC (rev 597)
@@ -15,7 +15,6 @@
Notes:
Bugs:
upstream:
-linux-2.6.16:
linux-2.6:
2.6.8-sarge-security:
2.4.27-sarge-security:
Modified: active/block-all-signals-race
===================================================================
--- active/block-all-signals-race 2006-09-25 03:19:00 UTC (rev 596)
+++ active/block-all-signals-race 2006-09-25 19:13:15 UTC (rev 597)
@@ -10,7 +10,6 @@
Notes:
Bugs:
upstream:
-linux-2.6.16:
linux-2.6: pending (2.6.15.5)
2.6.8-sarge-security:
2.4.27-sarge-security:
More information about the kernel-sec-discuss
mailing list