[kernel-sec-discuss] r727 - active
Dann Frazier
dannf at alioth.debian.org
Sat Mar 31 22:44:49 UTC 2007
Author: dannf
Date: 2007-03-31 22:44:49 +0000 (Sat, 31 Mar 2007)
New Revision: 727
Modified:
active/CVE-2006-5755
active/CVE-2006-6054
active/CVE-2006-6056
active/CVE-2006-6058
active/CVE-2006-6128
active/CVE-2007-0005
Log:
debian updates
Modified: active/CVE-2006-5755
===================================================================
--- active/CVE-2006-5755 2007-03-31 21:58:27 UTC (rev 726)
+++ active/CVE-2006-5755 2007-03-31 22:44:49 UTC (rev 727)
@@ -16,12 +16,14 @@
jmm> 658fdbef66e5e9be79b457edc2cbbb3add840aa9
jmm> amd64 equivalent of CVE-2006-5173
jmm> http://www.mail-archive.com/kgdb-bugreport@lists.sourceforge.net/msg00559.html
+ dannf> marking sarge/2.4 N/A since we released no sarge/2.4/amd64 kernel
+ dannf> ignoring for sarge7 because backport is non-trivial
Bugs:
upstream: released (2.6.18)
linux-2.6:
2.6.18-etch-security: N/A
-2.6.8-sarge-security: needed
-2.4.27-sarge-security: needed
+2.6.8-sarge-security: ignored (2.6.8-16sarge7)
+2.4.27-sarge-security: N/A
2.6.12-breezy-security: released (2.6.12-10.43)
2.6.15-dapper-security: released (2.6.15-28.51)
2.6.17-edgy-security: released (2.6.17.1-11.35)
Modified: active/CVE-2006-6054
===================================================================
--- active/CVE-2006-6054 2007-03-31 21:58:27 UTC (rev 726)
+++ active/CVE-2006-6054 2007-03-31 22:44:49 UTC (rev 727)
@@ -14,8 +14,8 @@
Notes:
Bugs:
upstream: released (2.6.20-rc5)
-linux-2.6:
-2.6.18-etch-security: needed
+linux-2.6: released (2.6.18.dfsg.1-10) [bugfix/2.6.18.38]
+2.6.18-etch-security: released (2.6.18.dfsg.1-10) [bugfix/2.6.18.38]
2.6.8-sarge-security: needed
2.4.27-sarge-security:
2.6.12-breezy-security: released (2.6.12-10.43)
Modified: active/CVE-2006-6056
===================================================================
--- active/CVE-2006-6056 2007-03-31 21:58:27 UTC (rev 726)
+++ active/CVE-2006-6056 2007-03-31 22:44:49 UTC (rev 727)
@@ -13,12 +13,14 @@
attacker could exploit this to crash the kernel. This only affects
systems which enable SELinux (Ubuntu disables SELinux by default).
Notes:
+ dannf> Though this bug fix applies to 2.4, 2.4 does not include SELinux
+ so it should not be vulnerable to the DoS
Bugs:
upstream: released (2.6.19)
-linux-2.6:
+linux-2.6: released (2.6.18.dfsg.1-10)
2.6.18-etch-security: released (2.6.18.dfsg.1-10) [bugfix/2.6.16.38]
-2.6.8-sarge-security: needed
-2.4.27-sarge-security:
+2.6.8-sarge-security: pending (2.6.8-16sarge7) [hfs-no-root-inode.dpatch]
+2.4.27-sarge-security: N/A
2.6.12-breezy-security: released (2.6.12-10.43)
2.6.15-dapper-security: released (2.6.15-28.51)
2.6.17-edgy-security: released (2.6.17.1-11.35)
Modified: active/CVE-2006-6058
===================================================================
--- active/CVE-2006-6058 2007-03-31 21:58:27 UTC (rev 726)
+++ active/CVE-2006-6058 2007-03-31 22:44:49 UTC (rev 727)
@@ -13,12 +13,14 @@
error.
Ubuntu-Description:
Notes:
+ dannf> ignored for sarge for now - only applies under very rare circumstances
+ and don't know if there's an upstream fix
Bugs:
upstream:
linux-2.6:
2.6.18-etch-security:
-2.6.8-sarge-security: needed
-2.4.27-sarge-security:
+2.6.8-sarge-security: ignored (2.6.8-16sarge7)
+2.4.27-sarge-security: ignored (2.4.27-10sarge6)
2.6.12-breezy-security: needed
2.6.15-dapper-security: needed
2.6.17-edgy-security: needed
Modified: active/CVE-2006-6128
===================================================================
--- active/CVE-2006-6128 2007-03-31 21:58:27 UTC (rev 726)
+++ active/CVE-2006-6128 2007-03-31 22:44:49 UTC (rev 727)
@@ -13,12 +13,13 @@
ReiserFS file system that triggers memory corruption when a sync is performed.
Ubuntu-Description:
Notes:
+ dannf> low impact - ignoring for sarge for now
Bugs:
upstream:
linux-2.6:
2.6.18-etch-security:
-2.6.8-sarge-security:
-2.4.27-sarge-security:
+2.6.8-sarge-security: ignored (2.6.8-16sarge7)
+2.4.27-sarge-security: ignored (2.4.27-10sarge6)
2.6.12-breezy-security: needed
2.6.15-dapper-security: needed
2.6.17-edgy-security: needed
Modified: active/CVE-2007-0005
===================================================================
--- active/CVE-2007-0005 2007-03-31 21:58:27 UTC (rev 726)
+++ active/CVE-2007-0005 2007-03-31 22:44:49 UTC (rev 727)
@@ -4,12 +4,13 @@
Buffer Overflow in Omnikey CardMan 4040 cmx driver
Ubuntu-Description:
Notes:
+ dannf> Driver wasn't in sarge
Bugs:
upstream:
linux-2.6:
2.6.18-etch-security:
-2.6.8-sarge-security:
-2.4.27-sarge-security:
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security: N/A
2.6.12-breezy-security:
2.6.15-dapper-security:
2.6.17-edgy-security:
More information about the kernel-sec-discuss
mailing list