[kernel-sec-discuss] r1129 - active
dannf at alioth.debian.org
dannf at alioth.debian.org
Sat Feb 9 00:39:46 UTC 2008
Author: dannf
Date: 2008-02-09 00:39:46 +0000 (Sat, 09 Feb 2008)
New Revision: 1129
Modified:
active/CVE-2006-5823
active/CVE-2006-6054
active/CVE-2006-6058
active/CVE-2007-0997
active/CVE-2007-2480
active/CVE-2007-3719
active/CVE-2007-6063
Log:
various 2.6.8/sarge updates
Modified: active/CVE-2006-5823
===================================================================
--- active/CVE-2006-5823 2008-02-08 23:12:28 UTC (rev 1128)
+++ active/CVE-2006-5823 2008-02-09 00:39:46 UTC (rev 1129)
@@ -19,7 +19,7 @@
upstream: released (2.4.36-pre2, 2.6.20-rc1)
linux-2.6: released (2.6.20-1)
2.6.18-etch-security: released (2.6.18.dfsg.1-10)
-2.6.8-sarge-security: needed
+2.6.8-sarge-security: pending (2.6.8-17sarge1) [cramfs-check-block-length.dpatch]
2.4.27-sarge-security: pending (2.4.27-10sarge6) [254_cramfs-check-block-length.diff]
2.6.12-breezy-security: released (2.6.12-10.43)
2.6.15-dapper-security: released (2.6.15-28.51)
Modified: active/CVE-2006-6054
===================================================================
--- active/CVE-2006-6054 2008-02-08 23:12:28 UTC (rev 1128)
+++ active/CVE-2006-6054 2008-02-09 00:39:46 UTC (rev 1129)
@@ -16,8 +16,8 @@
Bugs:
upstream: released (2.6.20-rc5)
linux-2.6: released (2.6.18.dfsg.1-10) [bugfix/2.6.18.38]
-2.6.18-etch-security: released (2.6.18.dfsg.1-10) [bugfix/2.6.18.38]
-2.6.8-sarge-security: needed
+2.6.18-etch-security: released (2.6.18.dfsg.1-10) [bugfix/2.6.16.38]
+2.6.8-sarge-security: pending (2.6.8-17sarge1) [ext2-skip-pages-past-num-blocks.dpatch]
2.4.27-sarge-security: needed (2.4.27-10sarge6) [255_ext2-skip-pages-past-num-blocks.diff] "pending upstream 2.4 acceptance"
2.6.12-breezy-security: released (2.6.12-10.43)
2.6.15-dapper-security: released (2.6.15-28.51)
Modified: active/CVE-2006-6058
===================================================================
--- active/CVE-2006-6058 2008-02-08 23:12:28 UTC (rev 1128)
+++ active/CVE-2006-6058 2008-02-09 00:39:46 UTC (rev 1129)
@@ -29,7 +29,7 @@
upstream: released (2.6.23.7, 2.6.24-rc1) [f44ec6f3f89889a469773b1fd894f8fcc07c29cf]
linux-2.6: released (2.6.23-1) [bugfix/2.6.23.7.patch]
2.6.18-etch-security: released (2.6.18.dfsg.1-13etch6) [bugfix/minixfs-printk-hang.patch]
-2.6.8-sarge-security: needed
+2.6.8-sarge-security: pending (2.6.8-17sarge1) [minixfs-printk-hang.dpatch]
2.4.27-sarge-security: ignored (2.4.27-10sarge6) "no printk_ratelimit in 2.4 - needs port"
2.6.15-dapper-security: pending (2.6.15-29.61)
2.6.17-edgy-security: released (2.6.17.1-12.42)
Modified: active/CVE-2007-0997
===================================================================
--- active/CVE-2007-0997 2008-02-08 23:12:28 UTC (rev 1128)
+++ active/CVE-2007-0997 2008-02-09 00:39:46 UTC (rev 1129)
@@ -15,7 +15,7 @@
upstream: released (2.6.18), release (2.6.17.7)
linux-2.6: released (2.6.18-1)
2.6.18-etch-security: N/A
-2.6.8-sarge-security:
+2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A "no sys_tee in 2.4"
2.6.15-dapper-security: N/A
2.6.17-edgy-security: N/A
Modified: active/CVE-2007-2480
===================================================================
--- active/CVE-2007-2480 2008-02-08 23:12:28 UTC (rev 1128)
+++ active/CVE-2007-2480 2008-02-09 00:39:46 UTC (rev 1129)
@@ -14,7 +14,7 @@
upstream: released (2.6.22)
linux-2.6: released (2.6.22-1)
2.6.18-etch-security: ignored (2.6.18.dfsg.1-13etch6) "needs backport"
-2.6.8-sarge-security:
+2.6.8-sarge-security: ignored (2.6.8-17sarge1) "needs backport"
2.4.27-sarge-security: ignored (2.4.27-10sarge6) "needs backport if affected"
2.6.15-dapper-security: needed (needs backporting)
2.6.17-edgy-security: needed (needs backporting)
Modified: active/CVE-2007-3719
===================================================================
--- active/CVE-2007-3719 2008-02-08 23:12:28 UTC (rev 1128)
+++ active/CVE-2007-3719 2008-02-09 00:39:46 UTC (rev 1129)
@@ -12,7 +12,7 @@
upstream:
linux-2.6:
2.6.18-etch-security: ignored (2.6.18.dfsg.1-13etch6) "no upstream fix"
-2.6.8-sarge-security:
+2.6.8-sarge-security: ignored (2.6.8-17sarge1) "no upstream fix"
2.4.27-sarge-security: ignored (2.4.27-10sarge6) "no upstream fix"
2.6.15-dapper-security: ignore (low priority, no obvious upstream fix)
2.6.17-edgy-security: ignore (low priority, no obvious upstream fix)
Modified: active/CVE-2007-6063
===================================================================
--- active/CVE-2007-6063 2008-02-08 23:12:28 UTC (rev 1128)
+++ active/CVE-2007-6063 2008-02-09 00:39:46 UTC (rev 1129)
@@ -14,7 +14,7 @@
upstream: released (2.6.24-rc4) [0f13864e5b24d9cbe18d125d41bfa4b726a82e40]
linux-2.6: released (2.6.23-2)
2.6.18-etch-security: released (2.6.18.dfsg.1-13etch6) [bugfix/isdn-net-overflow.patch]
-2.6.8-sarge-security:
+2.6.8-sarge-security: pending (2.6.8-17sarge1) [isdn-net-overflow.dpatch]
2.4.27-sarge-security: pending (2.4.27-10sarge6) [257_isdn-net-overflow.diff]
2.6.15-dapper-security: pending (2.6.15-51.65)
2.6.17-edgy-security: pending (2.6.17.1-12.43)
More information about the kernel-sec-discuss
mailing list