[kernel] r4973 - patch-tracking
Dann Frazier
dannf at costa.debian.org
Mon Dec 5 07:10:53 UTC 2005
Author: dannf
Date: Mon Dec 5 07:10:49 2005
New Revision: 4973
Modified:
patch-tracking/CVE-2003-0246
patch-tracking/CVE-2003-0247
patch-tracking/CVE-2003-0248
patch-tracking/CVE-2003-0364
Log:
update some more old issues
Modified: patch-tracking/CVE-2003-0246
==============================================================================
--- patch-tracking/CVE-2003-0246 (original)
+++ patch-tracking/CVE-2003-0246 Mon Dec 5 07:10:49 2005
@@ -31,15 +31,18 @@
restrict privileges, which allows local users to gain read or write access to
certain I/O ports.
Notes:
+ It looks like the patch originally included in woody was just a one line
+ change; whereas there were two larger patches that went upstream. I'm
+ moving our trees forward to the upstream one.
Bugs:
-upstream:
-2.6.14:
-2.6.8-sarge-security:
-2.4.27-sarge-security:
-2.6.8:
-2.4.19-woody-security:
-2.4.18-woody-security:
-2.4.17-woody-security: released (2.4.17-1woody1)
-2.4.16-woody-security:
-2.4.17-woody-security-hppa:
-2.4.17-woody-security-ia64:
+upstream: released (2.4.21-rc4)
+2.6.14: N/A
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security: N/A
+2.6.8: N/A
+2.4.19-woody-security: pending (2.4.19-4.woody3)
+2.4.18-woody-security: pending (2.4.18-14.4)
+2.4.17-woody-security: pending (2.4.17-1woody4)
+2.4.16-woody-security: pending (2.4.16-1woody3)
+2.4.17-woody-security-hppa: N/A
+2.4.17-woody-security-ia64: released (011226.14.1)
Modified: patch-tracking/CVE-2003-0247
==============================================================================
--- patch-tracking/CVE-2003-0247 (original)
+++ patch-tracking/CVE-2003-0247 Mon Dec 5 07:10:49 2005
@@ -28,17 +28,15 @@
Unknown vulnerability in the TTY layer of the Linux kernel 2.4 allows
attackers to cause a denial of service ("kernel oops").
Notes:
- dannf> I think this is the patch:
- http://linux.bkbits.net:8080/linux-2.4/cset@3ecd327dnjRvCM-0cRqFEi1GxPdnTg?nav=index.html|src/|src/drivers|src/drivers/char|related/drivers/char/tty_io.c
Bugs:
-upstream:
-2.6.14:
-2.6.8-sarge-security:
-2.4.27-sarge-security:
-2.6.8:
-2.4.19-woody-security:
-2.4.18-woody-security:
+upstream: released (2.4.21-rc3)
+2.6.14: N/A
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security: N/A
+2.6.8: N/A
+2.4.19-woody-security: pending (2.4.19-4.woody3)
+2.4.18-woody-security: released (2.4.18-9)
2.4.17-woody-security: released (2.4.17-1woody1)
-2.4.16-woody-security:
-2.4.17-woody-security-hppa:
-2.4.17-woody-security-ia64:
+2.4.16-woody-security: pending (2.4.16-1woody3)
+2.4.17-woody-security-hppa: pending (32.5)
+2.4.17-woody-security-ia64: released (011226.14.1)
Modified: patch-tracking/CVE-2003-0248
==============================================================================
--- patch-tracking/CVE-2003-0248 (original)
+++ patch-tracking/CVE-2003-0248 Mon Dec 5 07:10:49 2005
@@ -29,14 +29,14 @@
dannf> I think this is the patch:
dannf> http://linux.bkbits.net:8080/linux-2.4/cset@3f293760h0HL1XxaPHNYxPXmpO1k8g?nav=index.html|src/|src/arch|src/arch/i386|src/arch/i386/kernel|related/arch/i386/kernel/i387.c
Bugs:
-upstream:
-2.6.14:
-2.6.8-sarge-security:
-2.4.27-sarge-security:
-2.6.8:
-2.4.19-woody-security:
-2.4.18-woody-security:
+upstream: released (2.4.22-pre10)
+2.6.14: N/A
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security: N/A
+2.6.8: N/A
+2.4.19-woody-security: pending (2.4.19-4.woody3)
+2.4.18-woody-security: released (2.4.18-9)
2.4.17-woody-security: released (2.4.17-1woody1)
-2.4.16-woody-security:
-2.4.17-woody-security-hppa:
-2.4.17-woody-security-ia64:
+2.4.16-woody-security: pending (2.4.16-1woody3)
+2.4.17-woody-security-hppa: N/A
+2.4.17-woody-security-ia64: released (011226.14.1)
Modified: patch-tracking/CVE-2003-0364
==============================================================================
--- patch-tracking/CVE-2003-0364 (original)
+++ patch-tracking/CVE-2003-0364 Mon Dec 5 07:10:49 2005
@@ -24,23 +24,17 @@
The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote
attackers to cause a denial of service (CPU consumption) via certain packets that
cause a large number of hash table collisions.
- .
- dannf> Looked at backporting to 2.4.19. Needs:
- dannf> http://linux.bkbits.net:8080/linux-2.4/cset@3eb386b2dS-8SRa2JJ56ZkSILlS36w?nav=index.html|src/|src/include|src/include/linux|related/include/linux/jhash.h
- dannf> and
- dannf> http://linux.bkbits.net:8080/linux-2.4/cset@3ed4493chErJDQEJzZiV8csaf1XppA?nav=index.html|src/|src/net|src/net/ipv4|related/net/ipv4/ip_fragment.c
- dannf> and probably something in between
Notes:
Bugs:
-upstream:
-2.6.14:
-2.6.8-sarge-security:
-2.4.27-sarge-security:
-2.6.8:
+upstream: released (2.4.21-rc7)
+2.6.14: N/A
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security: N/A
+2.6.8: N/A
2.2.20-woody-security: released (2.2.20-5woody2)
-2.4.19-woody-security:
+2.4.19-woody-security: pending (2.4.19-4.woody3)
2.4.18-woody-security: released (2.4.18-9)
2.4.17-woody-security: released (2.4.17-1woody1)
-2.4.16-woody-security:
-2.4.17-woody-security-hppa:
-2.4.17-woody-security-ia64:
+2.4.16-woody-security: pending (2.4.16-1woody3)
+2.4.17-woody-security-hppa: pending (32.5)
+2.4.17-woody-security-ia64: released (011226.14.1)
More information about the Kernel-svn-changes
mailing list