[kernel] r5011 - patch-tracking
Moritz Muehlenhoff
jmm-guest at costa.debian.org
Wed Dec 14 20:58:12 UTC 2005
Author: jmm-guest
Date: Wed Dec 14 20:58:11 2005
New Revision: 5011
Modified:
patch-tracking/CVE-2005-1762
patch-tracking/CVE-2005-1767
patch-tracking/CVE-2005-1768
patch-tracking/CVE-2005-2459
patch-tracking/CVE-2005-2872
patch-tracking/CVE-2005-3257
patch-tracking/CVE-2005-3275
patch-tracking/CVE-2005-3808
Log:
record all fixes from the DSA for 2.4.27
Modified: patch-tracking/CVE-2005-1762
==============================================================================
--- patch-tracking/CVE-2005-1762 (original)
+++ patch-tracking/CVE-2005-1762 Wed Dec 14 20:58:11 2005
@@ -14,7 +14,7 @@
upstream: released (2.6.12-rc5)
2.6.14: N/A
2.6.8-sarge-security: pending (2.6.8-16sarge1) [arch-x86_64-kernel-ptrace-canonical-rip-1.dpatch]
-2.4.27-sarge-security: pending (2.4.27-11) [169_arch-x86_64-kernel-ptrace-canonical-rip-1.dpatch]
+2.4.27-sarge-security: released (2.4.27-10sarge1) [169_arch-x86_64-kernel-ptrace-canonical-rip-1.dpatch]
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-1767
==============================================================================
--- patch-tracking/CVE-2005-1767 (original)
+++ patch-tracking/CVE-2005-1767 Wed Dec 14 20:58:11 2005
@@ -13,8 +13,7 @@
2.6.14:
2.6.8-sarge-security:
2.4.27-sid/sarge: released (2.4.27-11)
-2.4.27-sarge-security:
-2.6.8:
+2.4.27-sarge-security: released (2.4.27-10sarge1)
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-1768
==============================================================================
--- patch-tracking/CVE-2005-1768 (original)
+++ patch-tracking/CVE-2005-1768 Wed Dec 14 20:58:11 2005
@@ -21,14 +21,11 @@
Notes:
167_arch-ia64-x86_64_execve.diff (note 2.4 is not supported for amd64)
upstream: released (2.4.31, 2.6.6)
-2.6.13: N/A
-2.6.12: N/A
2.6.8-sarge: N/A
2.6.8-sarge-security: N/A
2.4.27-sid/sarge: released (2.4.27-11)
2.4.27-sarge-security: released (2.4.27-10sarge1)
-2.6.14:
-2.6.8:
+2.6.14: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-2459
==============================================================================
--- patch-tracking/CVE-2005-2459 (original)
+++ patch-tracking/CVE-2005-2459 Wed Dec 14 20:58:11 2005
@@ -26,7 +26,7 @@
2.6.8-sarge: N/A
2.6.8-sarge-security: pending (2.6.8-16sarge2)
2.4.27-sid/sarge: N/A
-2.4.27-sarge-security: pending (2.6.8-16sarge2)
+2.4.27-sarge-security: released (2.4.27-10sarge1)
2.6.14:
2.6.8:
2.4.19-woody-security:
Modified: patch-tracking/CVE-2005-2872
==============================================================================
--- patch-tracking/CVE-2005-2872 (original)
+++ patch-tracking/CVE-2005-2872 Wed Dec 14 20:58:11 2005
@@ -18,13 +18,11 @@
length based on the u_int32_t type, acting on an array of unsigned
long elements, a different vulnerability than CVE-2005-2873.
upstream: released (2.6.12)
-2.6.13: N/A
-2.6.12: N/A
2.6.8-sarge: pending [net-ipv4-netfilter-ip_recent-last_pkts.dpatch]
2.6.8-sarge-security: pending [net-ipv4-netfilter-ip_recent-last_pkts.dpatch]
2.4.27-sid/sarge: released (2.4.27-11) [179_net-ipv4-netfilter-ip_recent-last_pkts.diff]
-2.4.27-sarge-security: pending [179_net-ipv4-netfilter-ip_recent-last_pkts.diff]
-2.6.14:
+2.4.27-sarge-security: released (2.4.27-10sarge1) [179_net-ipv4-netfilter-ip_recent-last_pkts.diff]
+2.6.14: N/A
2.6.8:
2.4.19-woody-security:
2.4.18-woody-security:
Modified: patch-tracking/CVE-2005-3257
==============================================================================
--- patch-tracking/CVE-2005-3257 (original)
+++ patch-tracking/CVE-2005-3257 Wed Dec 14 20:58:11 2005
@@ -10,9 +10,9 @@
Notes:
The first patch is the bit that adds the capability check; the second
one makes it less anal (only apply to writes).
-upstream: released (2.4.32-rc3), pending (2.6.15-rc1)
-2.6.13: needed
-2.6.12: needed
+ jmm> The patch targeted to 2.6.14.4 is slightly different, needs to be
+ jmm> sorted out.
+upstream: released (2.4.32-rc3), pending (2.6.15-rc1), pending (2.6.14.4)
2.6.8-sarge-security: pending (2.6.8-16sarge2) [setkeys-needs-root-1.dpatch, setkeys-needs-root-2.dpatch]
2.6.8-sarge:
2.4.27-sarge-security: pending (2.4.27-10sarge2) [197_setkeys-needs-root-1.diff, 197_setkeys-needs-root-2.diff]
Modified: patch-tracking/CVE-2005-3275
==============================================================================
--- patch-tracking/CVE-2005-3275 (original)
+++ patch-tracking/CVE-2005-3275 Wed Dec 14 20:58:11 2005
@@ -11,8 +11,6 @@
memory corruption.
Bugs:
upstream: released (2.6.12.3)
-2.6.13:
-2.6.12:
2.6.8-sarge-security: released (2.6.8-16sarge1) [netfilter-NAT-memory-corruption.dpatch]
2.4.27-sarge-security: released (2.4.27-10sarge1) [174_net-ipv4-netfilter-nat-mem.diff]
2.6.14:
Modified: patch-tracking/CVE-2005-3808
==============================================================================
--- patch-tracking/CVE-2005-3808 (original)
+++ patch-tracking/CVE-2005-3808 Wed Dec 14 20:58:11 2005
@@ -6,7 +6,7 @@
I didn't check the woody kernels, but it seems very unlikley
it is there.
Bugs:
-upstream: pending (2.6.15-rc3)
+upstream: pending (2.6.15-rc3), pending (2.6.14.4)
2.6.14: pending (2.6.14-4)
2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
More information about the Kernel-svn-changes
mailing list