[kernel] r5017 - patch-tracking
Moritz Muehlenhoff
jmm-guest at costa.debian.org
Thu Dec 15 10:18:05 UTC 2005
Author: jmm-guest
Date: Thu Dec 15 10:18:03 2005
New Revision: 5017
Modified:
patch-tracking/CVE-2005-0756
patch-tracking/CVE-2005-0757
patch-tracking/CVE-2005-1265
patch-tracking/CVE-2005-1761
patch-tracking/CVE-2005-1763
patch-tracking/CVE-2005-1765
patch-tracking/CVE-2005-1767
patch-tracking/CVE-2005-2459
patch-tracking/CVE-2005-3271
patch-tracking/CVE-2005-3273
patch-tracking/CVE-2005-3276
Log:
add patch annotations from DSA
Modified: patch-tracking/CVE-2005-0756
==============================================================================
--- patch-tracking/CVE-2005-0756 (original)
+++ patch-tracking/CVE-2005-0756 Thu Dec 15 10:18:03 2005
@@ -8,7 +8,7 @@
Bugs:
upstream:
2.6.14:
-2.6.8-sarge-security: released (2.6.8-16sarge1)
+2.6.8-sarge-security: released (2.6.8-16sarge1) [arch-x86_64-kernel-ptrace-canonical-rip-2.dpatch]
2.4.27-sarge-security: released (2.4.27-10sarge1)
2.4.19-woody-security:
2.4.18-woody-security:
Modified: patch-tracking/CVE-2005-0757
==============================================================================
--- patch-tracking/CVE-2005-0757 (original)
+++ patch-tracking/CVE-2005-0757 Thu Dec 15 10:18:03 2005
@@ -10,8 +10,8 @@
Bugs:
upstream:
2.4.27-sarge-security: released (2.4.27-10sarge1)
-2.6.14:
-2.6.8-sarge-security: released (2.6.8-16sarge1)
+2.6.14:
+2.6.8-sarge-security: released (2.6.8-16sarge1) [fs-ext3-64bit-offset.dpatch]
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-1265
==============================================================================
--- patch-tracking/CVE-2005-1265 (original)
+++ patch-tracking/CVE-2005-1265 Thu Dec 15 10:18:03 2005
@@ -10,7 +10,7 @@
Bugs:
upstream:
2.6.14:
-2.6.8-sarge-security: released (2.6.8-16sarge1)
+2.6.8-sarge-security: released (2.6.8-16sarge1) [mm-mmap-range-test.dpatch]
2.4.27-sarge-security:
2.4.19-woody-security:
2.4.18-woody-security:
Modified: patch-tracking/CVE-2005-1761
==============================================================================
--- patch-tracking/CVE-2005-1761 (original)
+++ patch-tracking/CVE-2005-1761 Thu Dec 15 10:18:03 2005
@@ -7,6 +7,7 @@
to cause a denial of service (kernel crash) via ptrace and the
restore_sigcontext function.
Notes:
+ jmm> This uses arch-ia64-ptrace-restore_sigcontext.dpatch, correct?
Bugs:
upstream: released (2.6.12.1)
2.6.14: N/A
Modified: patch-tracking/CVE-2005-1763
==============================================================================
--- patch-tracking/CVE-2005-1763 (original)
+++ patch-tracking/CVE-2005-1763 Thu Dec 15 10:18:03 2005
@@ -8,7 +8,7 @@
Bugs:
upstream: released (2.6.12-rc5)
2.6.14: N/A
-2.6.8-sarge-security: released (2.6.8-16sarge1)
+2.6.8-sarge-security: released (2.6.8-16sarge1) [arch-x86_64-kernel-ptrace-boundary-check.dpatch]
2.4.27-sarge-security:
2.4.19-woody-security:
2.4.18-woody-security:
Modified: patch-tracking/CVE-2005-1765
==============================================================================
--- patch-tracking/CVE-2005-1765 (original)
+++ patch-tracking/CVE-2005-1765 Thu Dec 15 10:18:03 2005
@@ -14,7 +14,7 @@
Bugs:
upstream:
2.6.14:
-2.6.8-sarge-security: released (2.6.8-16sarge1)
+2.6.8-sarge-security: released (2.6.8-16sarge1) [arch-x86_64-mm-mmap.dpatch]
2.4.27-sarge-security:
2.4.19-woody-security:
2.4.18-woody-security:
Modified: patch-tracking/CVE-2005-1767
==============================================================================
--- patch-tracking/CVE-2005-1767 (original)
+++ patch-tracking/CVE-2005-1767 Thu Dec 15 10:18:03 2005
@@ -11,9 +11,9 @@
Bugs:
upstream:
2.6.14:
-2.6.8-sarge-security:
+2.6.8-sarge-security: released (2.6.8-16sarge1) [arch-x86_64-kernel-stack-faults.dpatch, arch-x86_64-nmi.dpatch, arch-x86_64-kernel-stack-faults.dpatch]
2.4.27-sid/sarge: released (2.4.27-11)
-2.4.27-sarge-security: released (2.4.27-10sarge1) [181_arch-x86_64-kernel-stack-faults.diff]
+2.4.27-sarge-security: released (2.4.27-10sarge1) [181_arch-x86_64-kernel-stack-faults.diff
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-2459
==============================================================================
--- patch-tracking/CVE-2005-2459 (original)
+++ patch-tracking/CVE-2005-2459 Thu Dec 15 10:18:03 2005
@@ -24,7 +24,7 @@
2.6.13: N/A
2.6.12: N/A
2.6.8-sarge: N/A
-2.6.8-sarge-security: released (2.6.8-16sarge1)
+2.6.8-sarge-security: released (2.6.8-16sarge1) [linux-zlib-fixes.dpatch]
2.4.27-sid/sarge: N/A
2.4.27-sarge-security: released (2.4.27-10sarge1) [182_linux-zlib-fixes.diff]
2.6.14:
Modified: patch-tracking/CVE-2005-3271
==============================================================================
--- patch-tracking/CVE-2005-3271 (original)
+++ patch-tracking/CVE-2005-3271 Thu Dec 15 10:18:03 2005
@@ -12,7 +12,7 @@
a single user.
Bugs:
upstream: released (2.6.9)
-2.6.8-sarge-security: released (2.6.8-16sarge1)
+2.6.8-sarge-security: released (2.6.8-16sarge1) [fs-exec-posix-timers-leak-1.dpatch]
2.4.27-sarge-security: N/A
2.6.14: N/A
2.4.19-woody-security:
Modified: patch-tracking/CVE-2005-3273
==============================================================================
--- patch-tracking/CVE-2005-3273 (original)
+++ patch-tracking/CVE-2005-3273 Thu Dec 15 10:18:03 2005
@@ -10,7 +10,7 @@
errors with a large number of digipeats.
Bugs:
upstream: released (2.6.12)
-2.6.8-sarge-security: released (2.6.8-16sarge1)
+2.6.8-sarge-security: released (2.6.8-16sarge1) [net-rose-ndigis-verify.dpatch]
2.4.27-sarge-security: N/A
2.6.14: released (2.6.12-1)
2.4.19-woody-security:
Modified: patch-tracking/CVE-2005-3276
==============================================================================
--- patch-tracking/CVE-2005-3276 (original)
+++ patch-tracking/CVE-2005-3276 Thu Dec 15 10:18:03 2005
@@ -11,7 +11,7 @@
upstream: released (2.6.12.4)
2.6.13:
2.6.12:
-2.6.8-sarge-security: released (2.6.8-16sarge1)
+2.6.8-sarge-security: released (2.6.8-16sarge1) [sys_get_thread_area-leak.dpatch]
2.4.27-sarge-security: N/A
2.6.14:
2.6.8:
More information about the Kernel-svn-changes
mailing list