[kernel] r5014 - patch-tracking

Moritz Muehlenhoff jmm-guest at costa.debian.org
Thu Dec 15 09:40:17 UTC 2005


Author: jmm-guest
Date: Thu Dec 15 09:40:15 2005
New Revision: 5014

Modified:
   patch-tracking/CVE-2005-0756
   patch-tracking/CVE-2005-0757
   patch-tracking/CVE-2005-1265
   patch-tracking/CVE-2005-1761
   patch-tracking/CVE-2005-1762
   patch-tracking/CVE-2005-1763
   patch-tracking/CVE-2005-1764
   patch-tracking/CVE-2005-1765
   patch-tracking/CVE-2005-2456
   patch-tracking/CVE-2005-2458
   patch-tracking/CVE-2005-2459
   patch-tracking/CVE-2005-2548
   patch-tracking/CVE-2005-2801
   patch-tracking/CVE-2005-2872
   patch-tracking/CVE-2005-3105
   patch-tracking/CVE-2005-3106
   patch-tracking/CVE-2005-3107
   patch-tracking/CVE-2005-3108
   patch-tracking/CVE-2005-3109
   patch-tracking/CVE-2005-3110
   patch-tracking/CVE-2005-3271
   patch-tracking/CVE-2005-3272
   patch-tracking/CVE-2005-3273
   patch-tracking/CVE-2005-3274
   patch-tracking/CVE-2005-3276
Log:
process 2.6.8 kernel DSA


Modified: patch-tracking/CVE-2005-0756
==============================================================================
--- patch-tracking/CVE-2005-0756	(original)
+++ patch-tracking/CVE-2005-0756	Thu Dec 15 09:40:15 2005
@@ -8,7 +8,7 @@
 Bugs: 
 upstream: 
 2.6.14: 
-2.6.8-sarge-security: 
+2.6.8-sarge-security: released (2.6.8-16sarge1)
 2.4.27-sarge-security: released (2.4.27-10sarge1)
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-0757
==============================================================================
--- patch-tracking/CVE-2005-0757	(original)
+++ patch-tracking/CVE-2005-0757	Thu Dec 15 09:40:15 2005
@@ -11,8 +11,7 @@
 upstream: 
 2.4.27-sarge-security: released (2.4.27-10sarge1)
 2.6.14: 
-2.6.8-sarge-security: 
-2.6.8: 
+2.6.8-sarge-security: released (2.6.8-16sarge1)
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-1265
==============================================================================
--- patch-tracking/CVE-2005-1265	(original)
+++ patch-tracking/CVE-2005-1265	Thu Dec 15 09:40:15 2005
@@ -10,7 +10,7 @@
 Bugs: 
 upstream: 
 2.6.14: 
-2.6.8-sarge-security: 
+2.6.8-sarge-security: released (2.6.8-16sarge1)
 2.4.27-sarge-security: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-1761
==============================================================================
--- patch-tracking/CVE-2005-1761	(original)
+++ patch-tracking/CVE-2005-1761	Thu Dec 15 09:40:15 2005
@@ -10,7 +10,7 @@
 Bugs: 
 upstream: released (2.6.12.1)
 2.6.14: N/A
-2.6.8-sarge-security: pending (2.6.8-16sarge1) [arch-x86_64-private-tss.dpatch, arch-x86_64-nmi.dpatch]
+2.6.8-sarge-security: released (2.6.8-16sarge1) [arch-x86_64-private-tss.dpatch, arch-x86_64-nmi.dpatch]
 2.4.27-sarge-security: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-1762
==============================================================================
--- patch-tracking/CVE-2005-1762	(original)
+++ patch-tracking/CVE-2005-1762	Thu Dec 15 09:40:15 2005
@@ -13,7 +13,7 @@
 Bugs: 
 upstream: released (2.6.12-rc5)
 2.6.14: N/A
-2.6.8-sarge-security: pending (2.6.8-16sarge1) [arch-x86_64-kernel-ptrace-canonical-rip-1.dpatch] 
+2.6.8-sarge-security: released (2.6.8-16sarge1) [arch-x86_64-kernel-ptrace-canonical-rip-1.dpatch] 
 2.4.27-sarge-security: released (2.4.27-10sarge1) [169_arch-x86_64-kernel-ptrace-canonical-rip-1.dpatch]
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-1763
==============================================================================
--- patch-tracking/CVE-2005-1763	(original)
+++ patch-tracking/CVE-2005-1763	Thu Dec 15 09:40:15 2005
@@ -8,7 +8,7 @@
 Bugs: 
 upstream: released (2.6.12-rc5)
 2.6.14: N/A
-2.6.8-sarge-security: 
+2.6.8-sarge-security: released (2.6.8-16sarge1)
 2.4.27-sarge-security: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-1764
==============================================================================
--- patch-tracking/CVE-2005-1764	(original)
+++ patch-tracking/CVE-2005-1764	Thu Dec 15 09:40:15 2005
@@ -17,14 +17,11 @@
 Notes: 
  horms> I believe that only 2.6.11 is vulnerable to this
 upstream: released (2.6.11.11)
-2.6.13: N/A
-2.6.12: N/A
 2.6.8-sarge: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: N/A
 2.6.14: 
-2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-1765
==============================================================================
--- patch-tracking/CVE-2005-1765	(original)
+++ patch-tracking/CVE-2005-1765	Thu Dec 15 09:40:15 2005
@@ -14,9 +14,8 @@
 Bugs: 
 upstream: 
 2.6.14: 
-2.6.8-sarge-security: 
+2.6.8-sarge-security: released (2.6.8-16sarge1)
 2.4.27-sarge-security: 
-2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-2456
==============================================================================
--- patch-tracking/CVE-2005-2456	(original)
+++ patch-tracking/CVE-2005-2456	Thu Dec 15 09:40:15 2005
@@ -21,7 +21,7 @@
 Bugs: 321401
 upstream: 
 2.6.14: released (2.6.12-2)
-2.6.8-sarge-security: 
+2.6.8-sarge-security: released (2.6.8-16sarge1)
 2.4.27-sarge-security: released (2.4.27-10sarge1) [176_ipsec-array-overflow.diff]
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-2458
==============================================================================
--- patch-tracking/CVE-2005-2458	(original)
+++ patch-tracking/CVE-2005-2458	Thu Dec 15 09:40:15 2005
@@ -19,14 +19,12 @@
  allows remote attackers to cause a denial of service (kernel crash)
  via a compressed file with "improper tables".
 upstream: released (2.6.12.5)
-2.6.13: N/A
 2.6.12: released (2.6.12-3) [linux-2.6.12.5.patch]
 2.6.8-sarge: pending [linux-zlib-fixes.dpatch]
 2.6.8-sarge-security: released (2.6.8-16sarge1) [linux-zlib-fixes.dpatch]
 2.4.27-sid/sarge: released (2.4.27-11) [182_linux-zlib-fixes.diff]
 2.4.27-sarge-security: released (2.4.27-10sarge1) [182_linux-zlib-fixes.diff]
-2.6.14: 
-2.6.8: 
+2.6.14: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-2459
==============================================================================
--- patch-tracking/CVE-2005-2459	(original)
+++ patch-tracking/CVE-2005-2459	Thu Dec 15 09:40:15 2005
@@ -24,7 +24,7 @@
 2.6.13: N/A
 2.6.12: N/A
 2.6.8-sarge: N/A
-2.6.8-sarge-security: pending (2.6.8-16sarge2)
+2.6.8-sarge-security: released (2.6.8-16sarge1)
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: released (2.4.27-10sarge1) [182_linux-zlib-fixes.diff]
 2.6.14: 

Modified: patch-tracking/CVE-2005-2548
==============================================================================
--- patch-tracking/CVE-2005-2548	(original)
+++ patch-tracking/CVE-2005-2548	Thu Dec 15 09:40:15 2005
@@ -14,13 +14,11 @@
  packets that lead to a function call with the wrong argument, as
  demonstrated using snmpwalk on snmpd.
 upstream: released (2.4.29)
-2.6.13: N/A
-2.6.12: N/A
 2.6.8-sarge: pending [vlan-mii-ioctl.dpatch]
 2.6.8-sarge-security: released (2.6.8-16sarge1) [vlan-mii-ioctl.dpatch]
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: N/A
-2.6.14: 
+2.6.14: N/A
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-2801
==============================================================================
--- patch-tracking/CVE-2005-2801	(original)
+++ patch-tracking/CVE-2005-2801	Thu Dec 15 09:40:15 2005
@@ -11,14 +11,11 @@
  xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6
  does not properly compare the name_index fields when sharing xattr
  blocks, which could prevent default ACLs from being applied.
-Bugs: 
+Bugs: 332381
 upstream: released (2.6.11)
-2.6.13: 
-2.6.12: 
 2.6.8-sarge-security: released (2.6.8-16-sarge1) [fs_ext2_ext3_xattr-sharing.dpatch]
 2.4.27-sarge-security: released (2.4.27-10sarge1) [178_fs_ext2_ext3_xattr-sharing.diff]
-2.6.14: 
-2.6.8: 
+2.6.14: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-2872
==============================================================================
--- patch-tracking/CVE-2005-2872	(original)
+++ patch-tracking/CVE-2005-2872	Thu Dec 15 09:40:15 2005
@@ -19,11 +19,10 @@
  long elements, a different vulnerability than CVE-2005-2873.
 upstream: released (2.6.12)
 2.6.8-sarge: pending [net-ipv4-netfilter-ip_recent-last_pkts.dpatch]
-2.6.8-sarge-security: pending [net-ipv4-netfilter-ip_recent-last_pkts.dpatch]
+2.6.8-sarge-security: released (2.6.8-16sarge1) [net-ipv4-netfilter-ip_recent-last_pkts.dpatch]
 2.4.27-sid/sarge: released (2.4.27-11) [179_net-ipv4-netfilter-ip_recent-last_pkts.diff]
 2.4.27-sarge-security: released (2.4.27-10sarge1) [179_net-ipv4-netfilter-ip_recent-last_pkts.diff]
 2.6.14: N/A
-2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3105
==============================================================================
--- patch-tracking/CVE-2005-3105	(original)
+++ patch-tracking/CVE-2005-3105	Thu Dec 15 09:40:15 2005
@@ -22,14 +22,11 @@
  http://linux.bkbits.net:8080/linux-2.6/cset@4248d4019z8HvgrPAji51TKrWiV2uw?nav=index.html|src/|src/mm|related/mm/mprotect.c
 Bugs: 332569
 upstream: 2.6.12
-2.6.13: N/A
-2.6.12: N/A
 2.6.8-sarge: pending [mckinley_icache.dpatch]
 2.6.8-sarge-security: released (2.6.8-16sarge1) [mckinley_icache.dpatch]
 2.4.27-sid/sarge: needed
 2.4.27-sarge-security: needed
-2.6.14: 
-2.6.8: 
+2.6.14: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3106
==============================================================================
--- patch-tracking/CVE-2005-3106	(original)
+++ patch-tracking/CVE-2005-3106	Thu Dec 15 09:40:15 2005
@@ -20,13 +20,11 @@
  CLONE_VM
  http://linux.bkbits.net:8080/linux-2.6/diffs/fs/exec.c@1.156?nav=index.html|src/|src/fs|hist/fs/exec.c
 upstream: released (2.6.11)
-2.6.13: N/A
-2.6.12: N/A
 2.6.8-sarge: pending [fs-exec-ptrace-core-exec-race.dpatch]
 2.6.8-sarge-security: released (2.6.8-16sarge1) [fs-exec-ptrace-core-exec-race.dpatch]
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: N/A
-2.6.14: 
+2.6.14: N/A
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-3107
==============================================================================
--- patch-tracking/CVE-2005-3107	(original)
+++ patch-tracking/CVE-2005-3107	Thu Dec 15 09:40:15 2005
@@ -20,14 +20,11 @@
  thread is in TASK_TRACED state.
  http://www.kernel.org/pub/linux/kernel/people/akpm/patches/2.6/2.6.11-rc1/2.6.11-rc1-mm1/broken-out/fix-coredump_wait-deadlock-with-ptracer-tracee-on-shared-mm.patch
 upstream: released (2.6.11)
-2.6.13: N/A
-2.6.12: N/A
 2.6.8-sarge: pending [fs-exec-ptrace-deadlock.dpatch]
 2.6.8-sarge-security: released (2.6.8-16sarge1) [fs-exec-ptrace-deadlock.dpatch]
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: N/A
-2.6.14: 
-2.6.8: 
+2.6.14: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3108
==============================================================================
--- patch-tracking/CVE-2005-3108	(original)
+++ patch-tracking/CVE-2005-3108	Thu Dec 15 09:40:15 2005
@@ -18,14 +18,11 @@
  DoS and potential information leak in ioremap (seemingly specific to amd64)
  http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=93ef70a217637ade3f335303a112b22a134a1ec2 
 upstream: released (2.6.11.12)
-2.6.13: N/A
-2.6.12: N/A
 2.6.8-sarge: pending [arch-x86_64-mm-ioremap-page-lookup.dpatch]
 2.6.8-sarge-security: released (2.6.8-16sarge1) [arch-x86_64-mm-ioremap-page-lookup.dpatch]
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: N/A
-2.6.14: 
-2.6.8: 
+2.6.14: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3109
==============================================================================
--- patch-tracking/CVE-2005-3109	(original)
+++ patch-tracking/CVE-2005-3109	Thu Dec 15 09:40:15 2005
@@ -17,14 +17,11 @@
  Local DoS through oops by mounting a non-HFS+ filesystem as HFS+.
  Asking upstream about 2.4: http://lkml.org/lkml/2005/10/7/3/index.html
 upstream: released (2.6.11.12)
-2.6.13: N/A
-2.6.12: N/A
 2.6.8-sarge: pending [fs-hfs-oops-and-leak.dpatch]
 2.6.8-sarge-security: released (2.6.8-16sarge1) [fs-hfs-oops-and-leak.dpatch]
 2.4.27-sid/sarge: 
 2.4.27-sarge-security: 
-2.6.14: 
-2.6.8: 
+2.6.14: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3110
==============================================================================
--- patch-tracking/CVE-2005-3110	(original)
+++ patch-tracking/CVE-2005-3110	Thu Dec 15 09:40:15 2005
@@ -19,14 +19,11 @@
  DoS on SMP, potentially 2.4 and 2.6
  http://sourceforge.net/mailarchive/forum.php?thread_id=6800453&forum_id=8572
 upstream: released (2.6.11.11)
-2.6.13: N/A
-2.6.12: N/A
 2.6.8-sarge: pending [net-bridge-netfilter-etables-smp-race.dpatch]
 2.6.8-sarge-security: released (2.6.8-16sarge1) [net-bridge-netfilter-etables-smp-race.dpatch]
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: N/A
-2.6.14: 
-2.6.8: 
+2.6.14: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3271
==============================================================================
--- patch-tracking/CVE-2005-3271	(original)
+++ patch-tracking/CVE-2005-3271	Thu Dec 15 09:40:15 2005
@@ -12,12 +12,9 @@
  a single user.        
 Bugs: 
 upstream: released (2.6.9)
-2.6.13: N/A
-2.6.12: N/A
 2.6.8-sarge-security: released (2.6.8-16sarge1)
 2.4.27-sarge-security: N/A
-2.6.14: 
-2.6.8: 
+2.6.14: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3272
==============================================================================
--- patch-tracking/CVE-2005-3272	(original)
+++ patch-tracking/CVE-2005-3272	Thu Dec 15 09:40:15 2005
@@ -8,12 +8,9 @@
  filtering, which can cause the bridge to forward spoofed packets.  
 Bugs: 
 upstream: released (2.6.12)
-2.6.13: 
-2.6.12: 
 2.6.8-sarge-security: released (2.6.8-16sarge1) [net-bridge-forwarding-poison-1.dpatch, net-bridge-mangle-oops-1.dpatch, net-bridge-mangle-oops-2.dpatch]
 2.4.27-sarge-security: N/A
-2.6.14: 
-2.6.8: 
+2.6.14: released (2.6.12-1)
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3273
==============================================================================
--- patch-tracking/CVE-2005-3273	(original)
+++ patch-tracking/CVE-2005-3273	Thu Dec 15 09:40:15 2005
@@ -10,12 +10,9 @@
  errors with a large number of digipeats.                      
 Bugs: 
 upstream: released (2.6.12)
-2.6.13: N/A
-2.6.12: N/A
-2.6.8-sarge-security: pending (2.6.8-16sarge2)
+2.6.8-sarge-security: released (2.6.8-16sarge1)
 2.4.27-sarge-security: N/A
-2.6.14: 
-2.6.8: 
+2.6.14: released (2.6.12-1)
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3274
==============================================================================
--- patch-tracking/CVE-2005-3274	(original)
+++ patch-tracking/CVE-2005-3274	Thu Dec 15 09:40:15 2005
@@ -14,7 +14,7 @@
 upstream: released (2.6.13, 2.4.32-pre2)
 2.6.13: N/A
 2.6.12: 
-2.6.8-sarge-security: released (2.6.8-sarge1)
+2.6.8-sarge-security: released (2.6.8-16sarge1)
 2.4.27-sarge-security: pending (2.4.27-10sarge1)
 2.6.14: 
 2.6.8: 

Modified: patch-tracking/CVE-2005-3276
==============================================================================
--- patch-tracking/CVE-2005-3276	(original)
+++ patch-tracking/CVE-2005-3276	Thu Dec 15 09:40:15 2005
@@ -11,7 +11,7 @@
 upstream: released (2.6.12.4)
 2.6.13: 
 2.6.12: 
-2.6.8-sarge-security: pending (2.6.8-16sarge2)
+2.6.8-sarge-security: released (2.6.8-16sarge1)
 2.4.27-sarge-security: N/A
 2.6.14: 
 2.6.8: 



More information about the Kernel-svn-changes mailing list