[kernel-sec-discuss] r1129 - active

dannf at alioth.debian.org dannf at alioth.debian.org
Sat Feb 9 00:39:46 UTC 2008


Author: dannf
Date: 2008-02-09 00:39:46 +0000 (Sat, 09 Feb 2008)
New Revision: 1129

Modified:
   active/CVE-2006-5823
   active/CVE-2006-6054
   active/CVE-2006-6058
   active/CVE-2007-0997
   active/CVE-2007-2480
   active/CVE-2007-3719
   active/CVE-2007-6063
Log:
various 2.6.8/sarge updates

Modified: active/CVE-2006-5823
===================================================================
--- active/CVE-2006-5823	2008-02-08 23:12:28 UTC (rev 1128)
+++ active/CVE-2006-5823	2008-02-09 00:39:46 UTC (rev 1129)
@@ -19,7 +19,7 @@
 upstream: released (2.4.36-pre2, 2.6.20-rc1)
 linux-2.6: released (2.6.20-1)
 2.6.18-etch-security: released (2.6.18.dfsg.1-10)
-2.6.8-sarge-security: needed
+2.6.8-sarge-security: pending (2.6.8-17sarge1) [cramfs-check-block-length.dpatch]
 2.4.27-sarge-security: pending (2.4.27-10sarge6) [254_cramfs-check-block-length.diff]
 2.6.12-breezy-security: released (2.6.12-10.43)
 2.6.15-dapper-security: released (2.6.15-28.51)

Modified: active/CVE-2006-6054
===================================================================
--- active/CVE-2006-6054	2008-02-08 23:12:28 UTC (rev 1128)
+++ active/CVE-2006-6054	2008-02-09 00:39:46 UTC (rev 1129)
@@ -16,8 +16,8 @@
 Bugs: 
 upstream: released (2.6.20-rc5)
 linux-2.6: released (2.6.18.dfsg.1-10) [bugfix/2.6.18.38]
-2.6.18-etch-security: released (2.6.18.dfsg.1-10) [bugfix/2.6.18.38]
-2.6.8-sarge-security: needed
+2.6.18-etch-security: released (2.6.18.dfsg.1-10) [bugfix/2.6.16.38]
+2.6.8-sarge-security: pending (2.6.8-17sarge1) [ext2-skip-pages-past-num-blocks.dpatch]
 2.4.27-sarge-security: needed (2.4.27-10sarge6) [255_ext2-skip-pages-past-num-blocks.diff] "pending upstream 2.4 acceptance"
 2.6.12-breezy-security: released (2.6.12-10.43)
 2.6.15-dapper-security: released (2.6.15-28.51)

Modified: active/CVE-2006-6058
===================================================================
--- active/CVE-2006-6058	2008-02-08 23:12:28 UTC (rev 1128)
+++ active/CVE-2006-6058	2008-02-09 00:39:46 UTC (rev 1129)
@@ -29,7 +29,7 @@
 upstream: released (2.6.23.7, 2.6.24-rc1) [f44ec6f3f89889a469773b1fd894f8fcc07c29cf]
 linux-2.6: released (2.6.23-1) [bugfix/2.6.23.7.patch]
 2.6.18-etch-security: released (2.6.18.dfsg.1-13etch6) [bugfix/minixfs-printk-hang.patch]
-2.6.8-sarge-security: needed
+2.6.8-sarge-security: pending (2.6.8-17sarge1) [minixfs-printk-hang.dpatch]
 2.4.27-sarge-security: ignored (2.4.27-10sarge6) "no printk_ratelimit in 2.4 - needs port"
 2.6.15-dapper-security: pending (2.6.15-29.61)
 2.6.17-edgy-security: released (2.6.17.1-12.42)

Modified: active/CVE-2007-0997
===================================================================
--- active/CVE-2007-0997	2008-02-08 23:12:28 UTC (rev 1128)
+++ active/CVE-2007-0997	2008-02-09 00:39:46 UTC (rev 1129)
@@ -15,7 +15,7 @@
 upstream: released (2.6.18), release (2.6.17.7)
 linux-2.6: released (2.6.18-1)
 2.6.18-etch-security: N/A
-2.6.8-sarge-security: 
+2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A "no sys_tee in 2.4"
 2.6.15-dapper-security: N/A
 2.6.17-edgy-security: N/A

Modified: active/CVE-2007-2480
===================================================================
--- active/CVE-2007-2480	2008-02-08 23:12:28 UTC (rev 1128)
+++ active/CVE-2007-2480	2008-02-09 00:39:46 UTC (rev 1129)
@@ -14,7 +14,7 @@
 upstream: released (2.6.22)
 linux-2.6: released (2.6.22-1)
 2.6.18-etch-security: ignored (2.6.18.dfsg.1-13etch6) "needs backport"
-2.6.8-sarge-security: 
+2.6.8-sarge-security: ignored (2.6.8-17sarge1) "needs backport"
 2.4.27-sarge-security: ignored (2.4.27-10sarge6) "needs backport if affected"
 2.6.15-dapper-security: needed (needs backporting)
 2.6.17-edgy-security: needed (needs backporting)

Modified: active/CVE-2007-3719
===================================================================
--- active/CVE-2007-3719	2008-02-08 23:12:28 UTC (rev 1128)
+++ active/CVE-2007-3719	2008-02-09 00:39:46 UTC (rev 1129)
@@ -12,7 +12,7 @@
 upstream: 
 linux-2.6: 
 2.6.18-etch-security: ignored (2.6.18.dfsg.1-13etch6) "no upstream fix"
-2.6.8-sarge-security: 
+2.6.8-sarge-security: ignored (2.6.8-17sarge1) "no upstream fix"
 2.4.27-sarge-security: ignored (2.4.27-10sarge6) "no upstream fix"
 2.6.15-dapper-security: ignore (low priority, no obvious upstream fix)
 2.6.17-edgy-security: ignore (low priority, no obvious upstream fix)

Modified: active/CVE-2007-6063
===================================================================
--- active/CVE-2007-6063	2008-02-08 23:12:28 UTC (rev 1128)
+++ active/CVE-2007-6063	2008-02-09 00:39:46 UTC (rev 1129)
@@ -14,7 +14,7 @@
 upstream: released (2.6.24-rc4) [0f13864e5b24d9cbe18d125d41bfa4b726a82e40]
 linux-2.6: released (2.6.23-2)
 2.6.18-etch-security: released (2.6.18.dfsg.1-13etch6) [bugfix/isdn-net-overflow.patch]
-2.6.8-sarge-security: 
+2.6.8-sarge-security: pending (2.6.8-17sarge1) [isdn-net-overflow.dpatch]
 2.4.27-sarge-security: pending (2.4.27-10sarge6) [257_isdn-net-overflow.diff]
 2.6.15-dapper-security: pending (2.6.15-51.65)
 2.6.17-edgy-security: pending (2.6.17.1-12.43)




More information about the kernel-sec-discuss mailing list