[kernel] r5014 - patch-tracking
Moritz Muehlenhoff
jmm-guest at costa.debian.org
Thu Dec 15 09:40:17 UTC 2005
Author: jmm-guest
Date: Thu Dec 15 09:40:15 2005
New Revision: 5014
Modified:
patch-tracking/CVE-2005-0756
patch-tracking/CVE-2005-0757
patch-tracking/CVE-2005-1265
patch-tracking/CVE-2005-1761
patch-tracking/CVE-2005-1762
patch-tracking/CVE-2005-1763
patch-tracking/CVE-2005-1764
patch-tracking/CVE-2005-1765
patch-tracking/CVE-2005-2456
patch-tracking/CVE-2005-2458
patch-tracking/CVE-2005-2459
patch-tracking/CVE-2005-2548
patch-tracking/CVE-2005-2801
patch-tracking/CVE-2005-2872
patch-tracking/CVE-2005-3105
patch-tracking/CVE-2005-3106
patch-tracking/CVE-2005-3107
patch-tracking/CVE-2005-3108
patch-tracking/CVE-2005-3109
patch-tracking/CVE-2005-3110
patch-tracking/CVE-2005-3271
patch-tracking/CVE-2005-3272
patch-tracking/CVE-2005-3273
patch-tracking/CVE-2005-3274
patch-tracking/CVE-2005-3276
Log:
process 2.6.8 kernel DSA
Modified: patch-tracking/CVE-2005-0756
==============================================================================
--- patch-tracking/CVE-2005-0756 (original)
+++ patch-tracking/CVE-2005-0756 Thu Dec 15 09:40:15 2005
@@ -8,7 +8,7 @@
Bugs:
upstream:
2.6.14:
-2.6.8-sarge-security:
+2.6.8-sarge-security: released (2.6.8-16sarge1)
2.4.27-sarge-security: released (2.4.27-10sarge1)
2.4.19-woody-security:
2.4.18-woody-security:
Modified: patch-tracking/CVE-2005-0757
==============================================================================
--- patch-tracking/CVE-2005-0757 (original)
+++ patch-tracking/CVE-2005-0757 Thu Dec 15 09:40:15 2005
@@ -11,8 +11,7 @@
upstream:
2.4.27-sarge-security: released (2.4.27-10sarge1)
2.6.14:
-2.6.8-sarge-security:
-2.6.8:
+2.6.8-sarge-security: released (2.6.8-16sarge1)
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-1265
==============================================================================
--- patch-tracking/CVE-2005-1265 (original)
+++ patch-tracking/CVE-2005-1265 Thu Dec 15 09:40:15 2005
@@ -10,7 +10,7 @@
Bugs:
upstream:
2.6.14:
-2.6.8-sarge-security:
+2.6.8-sarge-security: released (2.6.8-16sarge1)
2.4.27-sarge-security:
2.4.19-woody-security:
2.4.18-woody-security:
Modified: patch-tracking/CVE-2005-1761
==============================================================================
--- patch-tracking/CVE-2005-1761 (original)
+++ patch-tracking/CVE-2005-1761 Thu Dec 15 09:40:15 2005
@@ -10,7 +10,7 @@
Bugs:
upstream: released (2.6.12.1)
2.6.14: N/A
-2.6.8-sarge-security: pending (2.6.8-16sarge1) [arch-x86_64-private-tss.dpatch, arch-x86_64-nmi.dpatch]
+2.6.8-sarge-security: released (2.6.8-16sarge1) [arch-x86_64-private-tss.dpatch, arch-x86_64-nmi.dpatch]
2.4.27-sarge-security:
2.4.19-woody-security:
2.4.18-woody-security:
Modified: patch-tracking/CVE-2005-1762
==============================================================================
--- patch-tracking/CVE-2005-1762 (original)
+++ patch-tracking/CVE-2005-1762 Thu Dec 15 09:40:15 2005
@@ -13,7 +13,7 @@
Bugs:
upstream: released (2.6.12-rc5)
2.6.14: N/A
-2.6.8-sarge-security: pending (2.6.8-16sarge1) [arch-x86_64-kernel-ptrace-canonical-rip-1.dpatch]
+2.6.8-sarge-security: released (2.6.8-16sarge1) [arch-x86_64-kernel-ptrace-canonical-rip-1.dpatch]
2.4.27-sarge-security: released (2.4.27-10sarge1) [169_arch-x86_64-kernel-ptrace-canonical-rip-1.dpatch]
2.4.19-woody-security:
2.4.18-woody-security:
Modified: patch-tracking/CVE-2005-1763
==============================================================================
--- patch-tracking/CVE-2005-1763 (original)
+++ patch-tracking/CVE-2005-1763 Thu Dec 15 09:40:15 2005
@@ -8,7 +8,7 @@
Bugs:
upstream: released (2.6.12-rc5)
2.6.14: N/A
-2.6.8-sarge-security:
+2.6.8-sarge-security: released (2.6.8-16sarge1)
2.4.27-sarge-security:
2.4.19-woody-security:
2.4.18-woody-security:
Modified: patch-tracking/CVE-2005-1764
==============================================================================
--- patch-tracking/CVE-2005-1764 (original)
+++ patch-tracking/CVE-2005-1764 Thu Dec 15 09:40:15 2005
@@ -17,14 +17,11 @@
Notes:
horms> I believe that only 2.6.11 is vulnerable to this
upstream: released (2.6.11.11)
-2.6.13: N/A
-2.6.12: N/A
2.6.8-sarge: N/A
2.6.8-sarge-security: N/A
2.4.27-sid/sarge: N/A
2.4.27-sarge-security: N/A
2.6.14:
-2.6.8:
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-1765
==============================================================================
--- patch-tracking/CVE-2005-1765 (original)
+++ patch-tracking/CVE-2005-1765 Thu Dec 15 09:40:15 2005
@@ -14,9 +14,8 @@
Bugs:
upstream:
2.6.14:
-2.6.8-sarge-security:
+2.6.8-sarge-security: released (2.6.8-16sarge1)
2.4.27-sarge-security:
-2.6.8:
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-2456
==============================================================================
--- patch-tracking/CVE-2005-2456 (original)
+++ patch-tracking/CVE-2005-2456 Thu Dec 15 09:40:15 2005
@@ -21,7 +21,7 @@
Bugs: 321401
upstream:
2.6.14: released (2.6.12-2)
-2.6.8-sarge-security:
+2.6.8-sarge-security: released (2.6.8-16sarge1)
2.4.27-sarge-security: released (2.4.27-10sarge1) [176_ipsec-array-overflow.diff]
2.4.19-woody-security:
2.4.18-woody-security:
Modified: patch-tracking/CVE-2005-2458
==============================================================================
--- patch-tracking/CVE-2005-2458 (original)
+++ patch-tracking/CVE-2005-2458 Thu Dec 15 09:40:15 2005
@@ -19,14 +19,12 @@
allows remote attackers to cause a denial of service (kernel crash)
via a compressed file with "improper tables".
upstream: released (2.6.12.5)
-2.6.13: N/A
2.6.12: released (2.6.12-3) [linux-2.6.12.5.patch]
2.6.8-sarge: pending [linux-zlib-fixes.dpatch]
2.6.8-sarge-security: released (2.6.8-16sarge1) [linux-zlib-fixes.dpatch]
2.4.27-sid/sarge: released (2.4.27-11) [182_linux-zlib-fixes.diff]
2.4.27-sarge-security: released (2.4.27-10sarge1) [182_linux-zlib-fixes.diff]
-2.6.14:
-2.6.8:
+2.6.14: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-2459
==============================================================================
--- patch-tracking/CVE-2005-2459 (original)
+++ patch-tracking/CVE-2005-2459 Thu Dec 15 09:40:15 2005
@@ -24,7 +24,7 @@
2.6.13: N/A
2.6.12: N/A
2.6.8-sarge: N/A
-2.6.8-sarge-security: pending (2.6.8-16sarge2)
+2.6.8-sarge-security: released (2.6.8-16sarge1)
2.4.27-sid/sarge: N/A
2.4.27-sarge-security: released (2.4.27-10sarge1) [182_linux-zlib-fixes.diff]
2.6.14:
Modified: patch-tracking/CVE-2005-2548
==============================================================================
--- patch-tracking/CVE-2005-2548 (original)
+++ patch-tracking/CVE-2005-2548 Thu Dec 15 09:40:15 2005
@@ -14,13 +14,11 @@
packets that lead to a function call with the wrong argument, as
demonstrated using snmpwalk on snmpd.
upstream: released (2.4.29)
-2.6.13: N/A
-2.6.12: N/A
2.6.8-sarge: pending [vlan-mii-ioctl.dpatch]
2.6.8-sarge-security: released (2.6.8-16sarge1) [vlan-mii-ioctl.dpatch]
2.4.27-sid/sarge: N/A
2.4.27-sarge-security: N/A
-2.6.14:
+2.6.14: N/A
2.6.8:
2.4.19-woody-security:
2.4.18-woody-security:
Modified: patch-tracking/CVE-2005-2801
==============================================================================
--- patch-tracking/CVE-2005-2801 (original)
+++ patch-tracking/CVE-2005-2801 Thu Dec 15 09:40:15 2005
@@ -11,14 +11,11 @@
xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6
does not properly compare the name_index fields when sharing xattr
blocks, which could prevent default ACLs from being applied.
-Bugs:
+Bugs: 332381
upstream: released (2.6.11)
-2.6.13:
-2.6.12:
2.6.8-sarge-security: released (2.6.8-16-sarge1) [fs_ext2_ext3_xattr-sharing.dpatch]
2.4.27-sarge-security: released (2.4.27-10sarge1) [178_fs_ext2_ext3_xattr-sharing.diff]
-2.6.14:
-2.6.8:
+2.6.14: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-2872
==============================================================================
--- patch-tracking/CVE-2005-2872 (original)
+++ patch-tracking/CVE-2005-2872 Thu Dec 15 09:40:15 2005
@@ -19,11 +19,10 @@
long elements, a different vulnerability than CVE-2005-2873.
upstream: released (2.6.12)
2.6.8-sarge: pending [net-ipv4-netfilter-ip_recent-last_pkts.dpatch]
-2.6.8-sarge-security: pending [net-ipv4-netfilter-ip_recent-last_pkts.dpatch]
+2.6.8-sarge-security: released (2.6.8-16sarge1) [net-ipv4-netfilter-ip_recent-last_pkts.dpatch]
2.4.27-sid/sarge: released (2.4.27-11) [179_net-ipv4-netfilter-ip_recent-last_pkts.diff]
2.4.27-sarge-security: released (2.4.27-10sarge1) [179_net-ipv4-netfilter-ip_recent-last_pkts.diff]
2.6.14: N/A
-2.6.8:
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-3105
==============================================================================
--- patch-tracking/CVE-2005-3105 (original)
+++ patch-tracking/CVE-2005-3105 Thu Dec 15 09:40:15 2005
@@ -22,14 +22,11 @@
http://linux.bkbits.net:8080/linux-2.6/cset@4248d4019z8HvgrPAji51TKrWiV2uw?nav=index.html|src/|src/mm|related/mm/mprotect.c
Bugs: 332569
upstream: 2.6.12
-2.6.13: N/A
-2.6.12: N/A
2.6.8-sarge: pending [mckinley_icache.dpatch]
2.6.8-sarge-security: released (2.6.8-16sarge1) [mckinley_icache.dpatch]
2.4.27-sid/sarge: needed
2.4.27-sarge-security: needed
-2.6.14:
-2.6.8:
+2.6.14: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-3106
==============================================================================
--- patch-tracking/CVE-2005-3106 (original)
+++ patch-tracking/CVE-2005-3106 Thu Dec 15 09:40:15 2005
@@ -20,13 +20,11 @@
CLONE_VM
http://linux.bkbits.net:8080/linux-2.6/diffs/fs/exec.c@1.156?nav=index.html|src/|src/fs|hist/fs/exec.c
upstream: released (2.6.11)
-2.6.13: N/A
-2.6.12: N/A
2.6.8-sarge: pending [fs-exec-ptrace-core-exec-race.dpatch]
2.6.8-sarge-security: released (2.6.8-16sarge1) [fs-exec-ptrace-core-exec-race.dpatch]
2.4.27-sid/sarge: N/A
2.4.27-sarge-security: N/A
-2.6.14:
+2.6.14: N/A
2.6.8:
2.4.19-woody-security:
2.4.18-woody-security:
Modified: patch-tracking/CVE-2005-3107
==============================================================================
--- patch-tracking/CVE-2005-3107 (original)
+++ patch-tracking/CVE-2005-3107 Thu Dec 15 09:40:15 2005
@@ -20,14 +20,11 @@
thread is in TASK_TRACED state.
http://www.kernel.org/pub/linux/kernel/people/akpm/patches/2.6/2.6.11-rc1/2.6.11-rc1-mm1/broken-out/fix-coredump_wait-deadlock-with-ptracer-tracee-on-shared-mm.patch
upstream: released (2.6.11)
-2.6.13: N/A
-2.6.12: N/A
2.6.8-sarge: pending [fs-exec-ptrace-deadlock.dpatch]
2.6.8-sarge-security: released (2.6.8-16sarge1) [fs-exec-ptrace-deadlock.dpatch]
2.4.27-sid/sarge: N/A
2.4.27-sarge-security: N/A
-2.6.14:
-2.6.8:
+2.6.14: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-3108
==============================================================================
--- patch-tracking/CVE-2005-3108 (original)
+++ patch-tracking/CVE-2005-3108 Thu Dec 15 09:40:15 2005
@@ -18,14 +18,11 @@
DoS and potential information leak in ioremap (seemingly specific to amd64)
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=93ef70a217637ade3f335303a112b22a134a1ec2
upstream: released (2.6.11.12)
-2.6.13: N/A
-2.6.12: N/A
2.6.8-sarge: pending [arch-x86_64-mm-ioremap-page-lookup.dpatch]
2.6.8-sarge-security: released (2.6.8-16sarge1) [arch-x86_64-mm-ioremap-page-lookup.dpatch]
2.4.27-sid/sarge: N/A
2.4.27-sarge-security: N/A
-2.6.14:
-2.6.8:
+2.6.14: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-3109
==============================================================================
--- patch-tracking/CVE-2005-3109 (original)
+++ patch-tracking/CVE-2005-3109 Thu Dec 15 09:40:15 2005
@@ -17,14 +17,11 @@
Local DoS through oops by mounting a non-HFS+ filesystem as HFS+.
Asking upstream about 2.4: http://lkml.org/lkml/2005/10/7/3/index.html
upstream: released (2.6.11.12)
-2.6.13: N/A
-2.6.12: N/A
2.6.8-sarge: pending [fs-hfs-oops-and-leak.dpatch]
2.6.8-sarge-security: released (2.6.8-16sarge1) [fs-hfs-oops-and-leak.dpatch]
2.4.27-sid/sarge:
2.4.27-sarge-security:
-2.6.14:
-2.6.8:
+2.6.14: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-3110
==============================================================================
--- patch-tracking/CVE-2005-3110 (original)
+++ patch-tracking/CVE-2005-3110 Thu Dec 15 09:40:15 2005
@@ -19,14 +19,11 @@
DoS on SMP, potentially 2.4 and 2.6
http://sourceforge.net/mailarchive/forum.php?thread_id=6800453&forum_id=8572
upstream: released (2.6.11.11)
-2.6.13: N/A
-2.6.12: N/A
2.6.8-sarge: pending [net-bridge-netfilter-etables-smp-race.dpatch]
2.6.8-sarge-security: released (2.6.8-16sarge1) [net-bridge-netfilter-etables-smp-race.dpatch]
2.4.27-sid/sarge: N/A
2.4.27-sarge-security: N/A
-2.6.14:
-2.6.8:
+2.6.14: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-3271
==============================================================================
--- patch-tracking/CVE-2005-3271 (original)
+++ patch-tracking/CVE-2005-3271 Thu Dec 15 09:40:15 2005
@@ -12,12 +12,9 @@
a single user.
Bugs:
upstream: released (2.6.9)
-2.6.13: N/A
-2.6.12: N/A
2.6.8-sarge-security: released (2.6.8-16sarge1)
2.4.27-sarge-security: N/A
-2.6.14:
-2.6.8:
+2.6.14: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-3272
==============================================================================
--- patch-tracking/CVE-2005-3272 (original)
+++ patch-tracking/CVE-2005-3272 Thu Dec 15 09:40:15 2005
@@ -8,12 +8,9 @@
filtering, which can cause the bridge to forward spoofed packets.
Bugs:
upstream: released (2.6.12)
-2.6.13:
-2.6.12:
2.6.8-sarge-security: released (2.6.8-16sarge1) [net-bridge-forwarding-poison-1.dpatch, net-bridge-mangle-oops-1.dpatch, net-bridge-mangle-oops-2.dpatch]
2.4.27-sarge-security: N/A
-2.6.14:
-2.6.8:
+2.6.14: released (2.6.12-1)
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-3273
==============================================================================
--- patch-tracking/CVE-2005-3273 (original)
+++ patch-tracking/CVE-2005-3273 Thu Dec 15 09:40:15 2005
@@ -10,12 +10,9 @@
errors with a large number of digipeats.
Bugs:
upstream: released (2.6.12)
-2.6.13: N/A
-2.6.12: N/A
-2.6.8-sarge-security: pending (2.6.8-16sarge2)
+2.6.8-sarge-security: released (2.6.8-16sarge1)
2.4.27-sarge-security: N/A
-2.6.14:
-2.6.8:
+2.6.14: released (2.6.12-1)
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-3274
==============================================================================
--- patch-tracking/CVE-2005-3274 (original)
+++ patch-tracking/CVE-2005-3274 Thu Dec 15 09:40:15 2005
@@ -14,7 +14,7 @@
upstream: released (2.6.13, 2.4.32-pre2)
2.6.13: N/A
2.6.12:
-2.6.8-sarge-security: released (2.6.8-sarge1)
+2.6.8-sarge-security: released (2.6.8-16sarge1)
2.4.27-sarge-security: pending (2.4.27-10sarge1)
2.6.14:
2.6.8:
Modified: patch-tracking/CVE-2005-3276
==============================================================================
--- patch-tracking/CVE-2005-3276 (original)
+++ patch-tracking/CVE-2005-3276 Thu Dec 15 09:40:15 2005
@@ -11,7 +11,7 @@
upstream: released (2.6.12.4)
2.6.13:
2.6.12:
-2.6.8-sarge-security: pending (2.6.8-16sarge2)
+2.6.8-sarge-security: released (2.6.8-16sarge1)
2.4.27-sarge-security: N/A
2.6.14:
2.6.8:
More information about the Kernel-svn-changes
mailing list