[kernel] r5011 - patch-tracking

Moritz Muehlenhoff jmm-guest at costa.debian.org
Wed Dec 14 20:58:12 UTC 2005


Author: jmm-guest
Date: Wed Dec 14 20:58:11 2005
New Revision: 5011

Modified:
   patch-tracking/CVE-2005-1762
   patch-tracking/CVE-2005-1767
   patch-tracking/CVE-2005-1768
   patch-tracking/CVE-2005-2459
   patch-tracking/CVE-2005-2872
   patch-tracking/CVE-2005-3257
   patch-tracking/CVE-2005-3275
   patch-tracking/CVE-2005-3808
Log:
record all fixes from the DSA for 2.4.27


Modified: patch-tracking/CVE-2005-1762
==============================================================================
--- patch-tracking/CVE-2005-1762	(original)
+++ patch-tracking/CVE-2005-1762	Wed Dec 14 20:58:11 2005
@@ -14,7 +14,7 @@
 upstream: released (2.6.12-rc5)
 2.6.14: N/A
 2.6.8-sarge-security: pending (2.6.8-16sarge1) [arch-x86_64-kernel-ptrace-canonical-rip-1.dpatch] 
-2.4.27-sarge-security: pending (2.4.27-11) [169_arch-x86_64-kernel-ptrace-canonical-rip-1.dpatch]
+2.4.27-sarge-security: released (2.4.27-10sarge1) [169_arch-x86_64-kernel-ptrace-canonical-rip-1.dpatch]
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-1767
==============================================================================
--- patch-tracking/CVE-2005-1767	(original)
+++ patch-tracking/CVE-2005-1767	Wed Dec 14 20:58:11 2005
@@ -13,8 +13,7 @@
 2.6.14: 
 2.6.8-sarge-security: 
 2.4.27-sid/sarge: released (2.4.27-11)
-2.4.27-sarge-security: 
-2.6.8: 
+2.4.27-sarge-security: released (2.4.27-10sarge1)
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-1768
==============================================================================
--- patch-tracking/CVE-2005-1768	(original)
+++ patch-tracking/CVE-2005-1768	Wed Dec 14 20:58:11 2005
@@ -21,14 +21,11 @@
 Notes: 
  167_arch-ia64-x86_64_execve.diff (note 2.4 is not supported for amd64)
 upstream: released (2.4.31, 2.6.6)
-2.6.13: N/A
-2.6.12: N/A
 2.6.8-sarge: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sid/sarge: released (2.4.27-11)
 2.4.27-sarge-security: released (2.4.27-10sarge1)
-2.6.14: 
-2.6.8: 
+2.6.14: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-2459
==============================================================================
--- patch-tracking/CVE-2005-2459	(original)
+++ patch-tracking/CVE-2005-2459	Wed Dec 14 20:58:11 2005
@@ -26,7 +26,7 @@
 2.6.8-sarge: N/A
 2.6.8-sarge-security: pending (2.6.8-16sarge2)
 2.4.27-sid/sarge: N/A
-2.4.27-sarge-security: pending (2.6.8-16sarge2)
+2.4.27-sarge-security: released (2.4.27-10sarge1)
 2.6.14: 
 2.6.8: 
 2.4.19-woody-security: 

Modified: patch-tracking/CVE-2005-2872
==============================================================================
--- patch-tracking/CVE-2005-2872	(original)
+++ patch-tracking/CVE-2005-2872	Wed Dec 14 20:58:11 2005
@@ -18,13 +18,11 @@
  length based on the u_int32_t type, acting on an array of unsigned
  long elements, a different vulnerability than CVE-2005-2873.
 upstream: released (2.6.12)
-2.6.13: N/A
-2.6.12: N/A
 2.6.8-sarge: pending [net-ipv4-netfilter-ip_recent-last_pkts.dpatch]
 2.6.8-sarge-security: pending [net-ipv4-netfilter-ip_recent-last_pkts.dpatch]
 2.4.27-sid/sarge: released (2.4.27-11) [179_net-ipv4-netfilter-ip_recent-last_pkts.diff]
-2.4.27-sarge-security: pending [179_net-ipv4-netfilter-ip_recent-last_pkts.diff]
-2.6.14: 
+2.4.27-sarge-security: released (2.4.27-10sarge1) [179_net-ipv4-netfilter-ip_recent-last_pkts.diff]
+2.6.14: N/A
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-3257
==============================================================================
--- patch-tracking/CVE-2005-3257	(original)
+++ patch-tracking/CVE-2005-3257	Wed Dec 14 20:58:11 2005
@@ -10,9 +10,9 @@
 Notes: 
  The first patch is the bit that adds the capability check; the second
  one makes it less anal (only apply to writes).
-upstream: released (2.4.32-rc3), pending (2.6.15-rc1)
-2.6.13: needed
-2.6.12: needed
+ jmm> The patch targeted to 2.6.14.4 is slightly different, needs to be
+ jmm> sorted out.
+upstream: released (2.4.32-rc3), pending (2.6.15-rc1), pending (2.6.14.4)
 2.6.8-sarge-security: pending (2.6.8-16sarge2) [setkeys-needs-root-1.dpatch, setkeys-needs-root-2.dpatch]
 2.6.8-sarge: 
 2.4.27-sarge-security: pending (2.4.27-10sarge2) [197_setkeys-needs-root-1.diff, 197_setkeys-needs-root-2.diff]

Modified: patch-tracking/CVE-2005-3275
==============================================================================
--- patch-tracking/CVE-2005-3275	(original)
+++ patch-tracking/CVE-2005-3275	Wed Dec 14 20:58:11 2005
@@ -11,8 +11,6 @@
  memory corruption.    
 Bugs: 
 upstream: released (2.6.12.3)
-2.6.13: 
-2.6.12: 
 2.6.8-sarge-security: released (2.6.8-16sarge1) [netfilter-NAT-memory-corruption.dpatch]
 2.4.27-sarge-security: released (2.4.27-10sarge1) [174_net-ipv4-netfilter-nat-mem.diff]
 2.6.14: 

Modified: patch-tracking/CVE-2005-3808
==============================================================================
--- patch-tracking/CVE-2005-3808	(original)
+++ patch-tracking/CVE-2005-3808	Wed Dec 14 20:58:11 2005
@@ -6,7 +6,7 @@
               I didn't check the woody kernels, but it seems very unlikley
               it is there.
 Bugs: 
-upstream: pending (2.6.15-rc3)
+upstream: pending (2.6.15-rc3), pending (2.6.14.4)
 2.6.14: pending (2.6.14-4)
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A



More information about the Kernel-svn-changes mailing list