[kernel] r5090 - patch-tracking

Dann Frazier dannf at costa.debian.org
Sun Dec 25 19:52:18 UTC 2005


Author: dannf
Date: Sun Dec 25 19:52:09 2005
New Revision: 5090

Modified:
   patch-tracking/00example
   patch-tracking/00pkglist
   patch-tracking/CVE-2002-0429
   patch-tracking/CVE-2003-0001
   patch-tracking/CVE-2003-0018
   patch-tracking/CVE-2003-0127
   patch-tracking/CVE-2003-0244
   patch-tracking/CVE-2003-0246
   patch-tracking/CVE-2003-0247
   patch-tracking/CVE-2003-0248
   patch-tracking/CVE-2003-0364
   patch-tracking/CVE-2003-0461
   patch-tracking/CVE-2003-0462
   patch-tracking/CVE-2003-0465
   patch-tracking/CVE-2003-0476
   patch-tracking/CVE-2003-0501
   patch-tracking/CVE-2003-0550
   patch-tracking/CVE-2003-0551
   patch-tracking/CVE-2003-0552
   patch-tracking/CVE-2003-0961
   patch-tracking/CVE-2003-0984
   patch-tracking/CVE-2003-0985
   patch-tracking/CVE-2004-0003
   patch-tracking/CVE-2004-0010
   patch-tracking/CVE-2004-0077
   patch-tracking/CVE-2004-0109
   patch-tracking/CVE-2004-0136
   patch-tracking/CVE-2004-0138
   patch-tracking/CVE-2004-0177
   patch-tracking/CVE-2004-0178
   patch-tracking/CVE-2004-0394
   patch-tracking/CVE-2004-0415
   patch-tracking/CVE-2004-0427
   patch-tracking/CVE-2004-0447
   patch-tracking/CVE-2004-0491
   patch-tracking/CVE-2004-0495
   patch-tracking/CVE-2004-0497
   patch-tracking/CVE-2004-0535
   patch-tracking/CVE-2004-0554
   patch-tracking/CVE-2004-0565
   patch-tracking/CVE-2004-0587
   patch-tracking/CVE-2004-0596
   patch-tracking/CVE-2004-0685
   patch-tracking/CVE-2004-0790
   patch-tracking/CVE-2004-0812
   patch-tracking/CVE-2004-0813
   patch-tracking/CVE-2004-0814
   patch-tracking/CVE-2004-0816
   patch-tracking/CVE-2004-0883
   patch-tracking/CVE-2004-0887
   patch-tracking/CVE-2004-0949
   patch-tracking/CVE-2004-0984
   patch-tracking/CVE-2004-0997
   patch-tracking/CVE-2004-1016
   patch-tracking/CVE-2004-1017
   patch-tracking/CVE-2004-1056
   patch-tracking/CVE-2004-1057
   patch-tracking/CVE-2004-1058
   patch-tracking/CVE-2004-1068
   patch-tracking/CVE-2004-1069
   patch-tracking/CVE-2004-1070
   patch-tracking/CVE-2004-1071
   patch-tracking/CVE-2004-1072
   patch-tracking/CVE-2004-1073
   patch-tracking/CVE-2004-1074
   patch-tracking/CVE-2004-1137
   patch-tracking/CVE-2004-1144
   patch-tracking/CVE-2004-1151
   patch-tracking/CVE-2004-1234
   patch-tracking/CVE-2004-1235
   patch-tracking/CVE-2004-1333
   patch-tracking/CVE-2004-1335
   patch-tracking/CVE-2004-1337
   patch-tracking/CVE-2004-2302
   patch-tracking/CVE-2004-2536
   patch-tracking/CVE-2004-2607
   patch-tracking/CVE-2005-0001
   patch-tracking/CVE-2005-0003
   patch-tracking/CVE-2005-0124
   patch-tracking/CVE-2005-0135
   patch-tracking/CVE-2005-0136
   patch-tracking/CVE-2005-0137
   patch-tracking/CVE-2005-0177
   patch-tracking/CVE-2005-0178
   patch-tracking/CVE-2005-0179
   patch-tracking/CVE-2005-0180
   patch-tracking/CVE-2005-0204
   patch-tracking/CVE-2005-0207
   patch-tracking/CVE-2005-0209
   patch-tracking/CVE-2005-0210
   patch-tracking/CVE-2005-0384
   patch-tracking/CVE-2005-0400
   patch-tracking/CVE-2005-0449
   patch-tracking/CVE-2005-0489
   patch-tracking/CVE-2005-0504
   patch-tracking/CVE-2005-0528
   patch-tracking/CVE-2005-0529
   patch-tracking/CVE-2005-0530
   patch-tracking/CVE-2005-0531
   patch-tracking/CVE-2005-0532
   patch-tracking/CVE-2005-0749
   patch-tracking/CVE-2005-0750
   patch-tracking/CVE-2005-0756
   patch-tracking/CVE-2005-0757
   patch-tracking/CVE-2005-0815
   patch-tracking/CVE-2005-0839
   patch-tracking/CVE-2005-1041
   patch-tracking/CVE-2005-1263
   patch-tracking/CVE-2005-1264
   patch-tracking/CVE-2005-1265
   patch-tracking/CVE-2005-1369
   patch-tracking/CVE-2005-1589
   patch-tracking/CVE-2005-1761
   patch-tracking/CVE-2005-1762
   patch-tracking/CVE-2005-1763
   patch-tracking/CVE-2005-1764
   patch-tracking/CVE-2005-1765
   patch-tracking/CVE-2005-1767
   patch-tracking/CVE-2005-1768
   patch-tracking/CVE-2005-1913
   patch-tracking/CVE-2005-2098
   patch-tracking/CVE-2005-2099
   patch-tracking/CVE-2005-2100
   patch-tracking/CVE-2005-2456
   patch-tracking/CVE-2005-2457
   patch-tracking/CVE-2005-2458
   patch-tracking/CVE-2005-2459
   patch-tracking/CVE-2005-2490
   patch-tracking/CVE-2005-2492
   patch-tracking/CVE-2005-2548
   patch-tracking/CVE-2005-2553
   patch-tracking/CVE-2005-2555
   patch-tracking/CVE-2005-2708
   patch-tracking/CVE-2005-2709
   patch-tracking/CVE-2005-2800
   patch-tracking/CVE-2005-2801
   patch-tracking/CVE-2005-2872
   patch-tracking/CVE-2005-2873
   patch-tracking/CVE-2005-2973
   patch-tracking/CVE-2005-3044
   patch-tracking/CVE-2005-3053
   patch-tracking/CVE-2005-3055
   patch-tracking/CVE-2005-3105
   patch-tracking/CVE-2005-3106
   patch-tracking/CVE-2005-3107
   patch-tracking/CVE-2005-3108
   patch-tracking/CVE-2005-3109
   patch-tracking/CVE-2005-3110
   patch-tracking/CVE-2005-3119
   patch-tracking/CVE-2005-3179
   patch-tracking/CVE-2005-3180
   patch-tracking/CVE-2005-3181
   patch-tracking/CVE-2005-3257
   patch-tracking/CVE-2005-3271
   patch-tracking/CVE-2005-3272
   patch-tracking/CVE-2005-3273
   patch-tracking/CVE-2005-3274
   patch-tracking/CVE-2005-3275
   patch-tracking/CVE-2005-3276
   patch-tracking/CVE-2005-3358
   patch-tracking/CVE-2005-3527
   patch-tracking/CVE-2005-3783
   patch-tracking/CVE-2005-3784
   patch-tracking/CVE-2005-3805
   patch-tracking/CVE-2005-3806
   patch-tracking/CVE-2005-3807
   patch-tracking/CVE-2005-3808
   patch-tracking/CVE-2005-3809
   patch-tracking/CVE-2005-3810
   patch-tracking/CVE-2005-3847
   patch-tracking/CVE-2005-3848
   patch-tracking/CVE-2005-3857
   patch-tracking/CVE-2005-3858
Log:
track issues against linux-2.6 instead of against each major release 2.6.12, 2.6.13, 2.6.14

Modified: patch-tracking/00example
==============================================================================
--- patch-tracking/00example	(original)
+++ patch-tracking/00example	Sun Dec 25 19:52:09 2005
@@ -25,8 +25,7 @@
 ## Prerequisite patches maybe listed in [] as well, even though they may not be
 ## directly part of the fix.
 upstream: released (2.6.12, 2.4.29-rc3), pending (2.6.11.3)
-2.6.13: pending
-2.6.12: pending (2.6.12-9)
+linux-2.6: pending (2.6.12-9)
 2.6.8-sarge-security: released (2.6.8-16sarge1) [patchname.patch, prerequisite.dpatch, prerequisite2.dpatch]
 2.4.27-sarge-security: needed
 2.4.27: N/A

Modified: patch-tracking/00pkglist
==============================================================================
--- patch-tracking/00pkglist	(original)
+++ patch-tracking/00pkglist	Sun Dec 25 19:52:09 2005
@@ -1,4 +1,4 @@
-2.6.14
+linux-2.6
 2.6.8-sarge-security
 2.6.8
 2.4.27-sarge-security

Modified: patch-tracking/CVE-2002-0429
==============================================================================
--- patch-tracking/CVE-2002-0429	(original)
+++ patch-tracking/CVE-2002-0429	Sun Dec 25 19:52:09 2005
@@ -17,7 +17,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.4.20)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.6.8: N/A

Modified: patch-tracking/CVE-2003-0001
==============================================================================
--- patch-tracking/CVE-2003-0001	(original)
+++ patch-tracking/CVE-2003-0001	Sun Dec 25 19:52:09 2005
@@ -26,7 +26,7 @@
  dannf> I've e-mailed the security team + mdz, asking for a patch
 Bugs: 
 upstream: released (2.4.21-pre4)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.6.8: N/A

Modified: patch-tracking/CVE-2003-0018
==============================================================================
--- patch-tracking/CVE-2003-0018	(original)
+++ patch-tracking/CVE-2003-0018	Sun Dec 25 19:52:09 2005
@@ -26,7 +26,7 @@
  dannf> Therefore, I'm marking >= sarge kernels N/A
 Bugs: 
 upstream: 
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.6.8: N/A

Modified: patch-tracking/CVE-2003-0127
==============================================================================
--- patch-tracking/CVE-2003-0127	(original)
+++ patch-tracking/CVE-2003-0127	Sun Dec 25 19:52:09 2005
@@ -50,7 +50,7 @@
  so marking this issue as N/A for 2.6.
 Bugs: 
 upstream: released (2.4.21-pre6)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.6.8: N/A

Modified: patch-tracking/CVE-2003-0244
==============================================================================
--- patch-tracking/CVE-2003-0244	(original)
+++ patch-tracking/CVE-2003-0244	Sun Dec 25 19:52:09 2005
@@ -38,7 +38,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.4.21-rc2)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.6.8: N/A

Modified: patch-tracking/CVE-2003-0246
==============================================================================
--- patch-tracking/CVE-2003-0246	(original)
+++ patch-tracking/CVE-2003-0246	Sun Dec 25 19:52:09 2005
@@ -38,7 +38,7 @@
  Patch is x86 only.
 Bugs: 
 upstream: released (2.4.21-rc4)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.6.8: N/A

Modified: patch-tracking/CVE-2003-0247
==============================================================================
--- patch-tracking/CVE-2003-0247	(original)
+++ patch-tracking/CVE-2003-0247	Sun Dec 25 19:52:09 2005
@@ -30,7 +30,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.4.21-rc3)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.6.8: N/A

Modified: patch-tracking/CVE-2003-0248
==============================================================================
--- patch-tracking/CVE-2003-0248	(original)
+++ patch-tracking/CVE-2003-0248	Sun Dec 25 19:52:09 2005
@@ -30,7 +30,7 @@
  dannf> http://linux.bkbits.net:8080/linux-2.4/cset@3f293760h0HL1XxaPHNYxPXmpO1k8g?nav=index.html|src/|src/arch|src/arch/i386|src/arch/i386/kernel|related/arch/i386/kernel/i387.c
 Bugs: 
 upstream: released (2.4.22-pre10)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.6.8: N/A

Modified: patch-tracking/CVE-2003-0364
==============================================================================
--- patch-tracking/CVE-2003-0364	(original)
+++ patch-tracking/CVE-2003-0364	Sun Dec 25 19:52:09 2005
@@ -27,7 +27,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.4.21-rc7)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.6.8: N/A

Modified: patch-tracking/CVE-2003-0461
==============================================================================
--- patch-tracking/CVE-2003-0461	(original)
+++ patch-tracking/CVE-2003-0461	Sun Dec 25 19:52:09 2005
@@ -24,7 +24,7 @@
  http://linux.bkbits.net:8080/linux-2.4/cset@41aca810DvutJ8aEj43OuUqJ4e1EIw?nav=index.html|src/|src/include|src/include/linux|related/include/linux/proc_fs.h
 Bugs: 
 upstream: released (2.4.29-pre2, 2.6.1)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: released (2.4.27-1) [025_proc_tty_security.diff]
 2.6.8: N/A

Modified: patch-tracking/CVE-2003-0462
==============================================================================
--- patch-tracking/CVE-2003-0462	(original)
+++ patch-tracking/CVE-2003-0462	Sun Dec 25 19:52:09 2005
@@ -35,7 +35,7 @@
  jmm> o Fix /proc/self security issue
 Bugs: 
 upstream: released (2.6.1), released (2.4.22-pre10)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.6.8: N/A

Modified: patch-tracking/CVE-2003-0465
==============================================================================
--- patch-tracking/CVE-2003-0465	(original)
+++ patch-tracking/CVE-2003-0465	Sun Dec 25 19:52:09 2005
@@ -19,7 +19,7 @@
  dannf> and mark the 2.4 issues as complete.
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: released (2.4.27-8)
 2.6.8: 

Modified: patch-tracking/CVE-2003-0476
==============================================================================
--- patch-tracking/CVE-2003-0476	(original)
+++ patch-tracking/CVE-2003-0476	Sun Dec 25 19:52:09 2005
@@ -25,7 +25,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.4.22-pre4, 2.6.1)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.6.8: N/A

Modified: patch-tracking/CVE-2003-0501
==============================================================================
--- patch-tracking/CVE-2003-0501	(original)
+++ patch-tracking/CVE-2003-0501	Sun Dec 25 19:52:09 2005
@@ -21,7 +21,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.4.22-pre10)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.6.8: N/A

Modified: patch-tracking/CVE-2003-0550
==============================================================================
--- patch-tracking/CVE-2003-0550	(original)
+++ patch-tracking/CVE-2003-0550	Sun Dec 25 19:52:09 2005
@@ -14,7 +14,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.4.22-pre3)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.6.8: N/A

Modified: patch-tracking/CVE-2003-0551
==============================================================================
--- patch-tracking/CVE-2003-0551	(original)
+++ patch-tracking/CVE-2003-0551	Sun Dec 25 19:52:09 2005
@@ -16,7 +16,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.4.22-pre3)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.6.8: N/A

Modified: patch-tracking/CVE-2003-0552
==============================================================================
--- patch-tracking/CVE-2003-0552	(original)
+++ patch-tracking/CVE-2003-0552	Sun Dec 25 19:52:09 2005
@@ -16,7 +16,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.4.22-pre3)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.6.8: N/A

Modified: patch-tracking/CVE-2003-0961
==============================================================================
--- patch-tracking/CVE-2003-0961	(original)
+++ patch-tracking/CVE-2003-0961	Sun Dec 25 19:52:09 2005
@@ -55,7 +55,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.4.23-pre7)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.6.8: N/A

Modified: patch-tracking/CVE-2003-0984
==============================================================================
--- patch-tracking/CVE-2003-0984	(original)
+++ patch-tracking/CVE-2003-0984	Sun Dec 25 19:52:09 2005
@@ -34,7 +34,7 @@
  jmm> | o /dev/rtc can leak parts of kernel memory to unpriviledged users
 Bugs: 
 upstream: released (2.4.24-rc1, 2.6.2)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.6.8: N/A

Modified: patch-tracking/CVE-2003-0985
==============================================================================
--- patch-tracking/CVE-2003-0985	(original)
+++ patch-tracking/CVE-2003-0985	Sun Dec 25 19:52:09 2005
@@ -42,7 +42,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2004-0003
==============================================================================
--- patch-tracking/CVE-2004-0003	(original)
+++ patch-tracking/CVE-2004-0003	Sun Dec 25 19:52:09 2005
@@ -4,7 +4,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.4.26-rc4)
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.6.8:
 2.4.27-sarge-security: 

Modified: patch-tracking/CVE-2004-0010
==============================================================================
--- patch-tracking/CVE-2004-0010	(original)
+++ patch-tracking/CVE-2004-0010	Sun Dec 25 19:52:09 2005
@@ -4,7 +4,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.4.25-pre7) 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: N/A
 2.6.8:

Modified: patch-tracking/CVE-2004-0077
==============================================================================
--- patch-tracking/CVE-2004-0077	(original)
+++ patch-tracking/CVE-2004-0077	Sun Dec 25 19:52:09 2005
@@ -4,7 +4,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2004-0109
==============================================================================
--- patch-tracking/CVE-2004-0109	(original)
+++ patch-tracking/CVE-2004-0109	Sun Dec 25 19:52:09 2005
@@ -4,7 +4,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2004-0136
==============================================================================
--- patch-tracking/CVE-2004-0136	(original)
+++ patch-tracking/CVE-2004-0136	Sun Dec 25 19:52:09 2005
@@ -16,7 +16,7 @@
  RedHat URLs above.
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2004-0138
==============================================================================
--- patch-tracking/CVE-2004-0138	(original)
+++ patch-tracking/CVE-2004-0138	Sun Dec 25 19:52:09 2005
@@ -5,7 +5,7 @@
  Still marked **RESERVED**
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2004-0177
==============================================================================
--- patch-tracking/CVE-2004-0177	(original)
+++ patch-tracking/CVE-2004-0177	Sun Dec 25 19:52:09 2005
@@ -4,7 +4,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.4.26-pre4)
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: N/A
 2.4.19-woody-security: released (2.4.19-4.woody2)

Modified: patch-tracking/CVE-2004-0178
==============================================================================
--- patch-tracking/CVE-2004-0178	(original)
+++ patch-tracking/CVE-2004-0178	Sun Dec 25 19:52:09 2005
@@ -27,7 +27,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.4.26-pre3)
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: N/A
 2.4.19-woody-security: released (2.4.19-4.woody2)

Modified: patch-tracking/CVE-2004-0394
==============================================================================
--- patch-tracking/CVE-2004-0394	(original)
+++ patch-tracking/CVE-2004-0394	Sun Dec 25 19:52:09 2005
@@ -24,7 +24,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2004-0415
==============================================================================
--- patch-tracking/CVE-2004-0415	(original)
+++ patch-tracking/CVE-2004-0415	Sun Dec 25 19:52:09 2005
@@ -20,7 +20,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.4.27-rc6)
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: N/A
 2.6.8: 

Modified: patch-tracking/CVE-2004-0427
==============================================================================
--- patch-tracking/CVE-2004-0427	(original)
+++ patch-tracking/CVE-2004-0427	Sun Dec 25 19:52:09 2005
@@ -58,7 +58,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.4.26, 2.6.6)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.6.8: N/A

Modified: patch-tracking/CVE-2004-0447
==============================================================================
--- patch-tracking/CVE-2004-0447	(original)
+++ patch-tracking/CVE-2004-0447	Sun Dec 25 19:52:09 2005
@@ -22,7 +22,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2004-0491
==============================================================================
--- patch-tracking/CVE-2004-0491	(original)
+++ patch-tracking/CVE-2004-0491	Sun Dec 25 19:52:09 2005
@@ -13,7 +13,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2004-0495
==============================================================================
--- patch-tracking/CVE-2004-0495	(original)
+++ patch-tracking/CVE-2004-0495	Sun Dec 25 19:52:09 2005
@@ -29,7 +29,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.4.27-rc1)
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: N/A
 2.6.8: 

Modified: patch-tracking/CVE-2004-0497
==============================================================================
--- patch-tracking/CVE-2004-0497	(original)
+++ patch-tracking/CVE-2004-0497	Sun Dec 25 19:52:09 2005
@@ -19,7 +19,7 @@
  Changelog shows fixed in 2.4.26-3
 Bugs: 
 upstream: released (2.4.27)
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: released (2.4.27-1)
 2.4.19-woody-security: 

Modified: patch-tracking/CVE-2004-0535
==============================================================================
--- patch-tracking/CVE-2004-0535	(original)
+++ patch-tracking/CVE-2004-0535	Sun Dec 25 19:52:09 2005
@@ -30,7 +30,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.4.27)
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: N/A
 2.6.8: 

Modified: patch-tracking/CVE-2004-0554
==============================================================================
--- patch-tracking/CVE-2004-0554	(original)
+++ patch-tracking/CVE-2004-0554	Sun Dec 25 19:52:09 2005
@@ -40,7 +40,7 @@
 Notes: 
 Bugs: 261521
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2004-0565
==============================================================================
--- patch-tracking/CVE-2004-0565	(original)
+++ patch-tracking/CVE-2004-0565	Sun Dec 25 19:52:09 2005
@@ -14,7 +14,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.4.27)
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: N/A
 2.6.8: 

Modified: patch-tracking/CVE-2004-0587
==============================================================================
--- patch-tracking/CVE-2004-0587	(original)
+++ patch-tracking/CVE-2004-0587	Sun Dec 25 19:52:09 2005
@@ -28,7 +28,7 @@
  was it still vulnerable?
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2004-0596
==============================================================================
--- patch-tracking/CVE-2004-0596	(original)
+++ patch-tracking/CVE-2004-0596	Sun Dec 25 19:52:09 2005
@@ -12,7 +12,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: 
 2.6.8: N/A

Modified: patch-tracking/CVE-2004-0685
==============================================================================
--- patch-tracking/CVE-2004-0685	(original)
+++ patch-tracking/CVE-2004-0685	Sun Dec 25 19:52:09 2005
@@ -21,7 +21,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.4.27)
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: N/A
 2.6.8: 

Modified: patch-tracking/CVE-2004-0790
==============================================================================
--- patch-tracking/CVE-2004-0790	(original)
+++ patch-tracking/CVE-2004-0790	Sun Dec 25 19:52:09 2005
@@ -32,7 +32,7 @@
 Notes: 
 Bugs: 305655 305664
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-16) [net-ipv4-icmp-quench.dpatch]
 2.4.27-sarge-security: released (2.4.27-10) [164_net-ipv4-icmp-quench.diff]
 2.6.8: released (2.6.8-16) [net-ipv4-icmp-quench.dpatch]

Modified: patch-tracking/CVE-2004-0812
==============================================================================
--- patch-tracking/CVE-2004-0812	(original)
+++ patch-tracking/CVE-2004-0812	Sun Dec 25 19:52:09 2005
@@ -19,7 +19,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2004-0813
==============================================================================
--- patch-tracking/CVE-2004-0813	(original)
+++ patch-tracking/CVE-2004-0813	Sun Dec 25 19:52:09 2005
@@ -10,7 +10,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2004-0814
==============================================================================
--- patch-tracking/CVE-2004-0814	(original)
+++ patch-tracking/CVE-2004-0814	Sun Dec 25 19:52:09 2005
@@ -26,7 +26,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-8) [tty-locking-fixes.dpatch, tty-locking-fixes2.dpatch, tty-locking-fixes3.dpatch, tty-locking-fixes4.dpatch, tty-locking-fixes5.dpatch, tty-locking-fixes6.dpatch, tty-locking-fixes7.dpatch, tty-locking-fixes8.dpatch]
 2.4.27-sarge-security: released (2.4.27-7) [093_tty_lockup.diff, 093_tty_lockup-2.diff, 115_tty_lockup-3.diff, 093-tty_lockup-3.diff]
 2.6.8: released (2.6.8-8) [tty-locking-fixes.dpatch, tty-locking-fixes2.dpatch, tty-locking-fixes3.dpatch, tty-locking-fixes4.dpatch, tty-locking-fixes5.dpatch, tty-locking-fixes6.dpatch, tty-locking-fixes7.dpatch, tty-locking-fixes8.dpatch]

Modified: patch-tracking/CVE-2004-0816
==============================================================================
--- patch-tracking/CVE-2004-0816	(original)
+++ patch-tracking/CVE-2004-0816	Sun Dec 25 19:52:09 2005
@@ -17,7 +17,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2004-0883
==============================================================================
--- patch-tracking/CVE-2004-0883	(original)
+++ patch-tracking/CVE-2004-0883	Sun Dec 25 19:52:09 2005
@@ -36,7 +36,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2004-0887
==============================================================================
--- patch-tracking/CVE-2004-0887	(original)
+++ patch-tracking/CVE-2004-0887	Sun Dec 25 19:52:09 2005
@@ -10,7 +10,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-10)
 2.4.27-sarge-security: 
 2.4.19-woody-security: 

Modified: patch-tracking/CVE-2004-0949
==============================================================================
--- patch-tracking/CVE-2004-0949	(original)
+++ patch-tracking/CVE-2004-0949	Sun Dec 25 19:52:09 2005
@@ -28,7 +28,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2004-0984
==============================================================================
--- patch-tracking/CVE-2004-0984	(original)
+++ patch-tracking/CVE-2004-0984	Sun Dec 25 19:52:09 2005
@@ -4,7 +4,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2004-0997
==============================================================================
--- patch-tracking/CVE-2004-0997	(original)
+++ patch-tracking/CVE-2004-0997	Sun Dec 25 19:52:09 2005
@@ -5,7 +5,7 @@
  Still marked **RESERVED**
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2004-1016
==============================================================================
--- patch-tracking/CVE-2004-1016	(original)
+++ patch-tracking/CVE-2004-1016	Sun Dec 25 19:52:09 2005
@@ -23,7 +23,7 @@
         vulnerable.
 Bugs: 
 upstream: 
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: released (2.6.8-11) [scm_send-dos-fix.dpatch, scm_send-dos-fix2.dpatch]
 2.4.27-sarge-security: 
 2.6.8: released (2.6.8-11) [scm_send-dos-fix.dpatch, scm_send-dos-fix2.dpatch]

Modified: patch-tracking/CVE-2004-1017
==============================================================================
--- patch-tracking/CVE-2004-1017	(original)
+++ patch-tracking/CVE-2004-1017	Sun Dec 25 19:52:09 2005
@@ -12,7 +12,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: released (2.4.27-9) [137_io_edgeport_overflow.diff]
 2.6.8: 

Modified: patch-tracking/CVE-2004-1056
==============================================================================
--- patch-tracking/CVE-2004-1056	(original)
+++ patch-tracking/CVE-2004-1056	Sun Dec 25 19:52:09 2005
@@ -15,7 +15,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-11) [drm-locking-fixes.dpatch]
 2.4.27-sarge-security: released (2.4.27-8) [121_drm-locking-checks-1.diff, 121_drm-locking-checks-2.diff]
 2.6.8: released (2.6.8-11) [drm-locking-fixes.dpatch]

Modified: patch-tracking/CVE-2004-1057
==============================================================================
--- patch-tracking/CVE-2004-1057	(original)
+++ patch-tracking/CVE-2004-1057	Sun Dec 25 19:52:09 2005
@@ -13,7 +13,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: released (2.4.27-10) [165_VM_IO.diff]
 2.6.8: 

Modified: patch-tracking/CVE-2004-1058
==============================================================================
--- patch-tracking/CVE-2004-1058	(original)
+++ patch-tracking/CVE-2004-1058	Sun Dec 25 19:52:09 2005
@@ -16,7 +16,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-14) [proc-cmdline-mmput-leak.dpatch]
 2.4.27-sarge-security: 
 2.6.8: released (2.6.8-14) [proc-cmdline-mmput-leak.dpatch]

Modified: patch-tracking/CVE-2004-1068
==============================================================================
--- patch-tracking/CVE-2004-1068	(original)
+++ patch-tracking/CVE-2004-1068	Sun Dec 25 19:52:09 2005
@@ -21,7 +21,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.4.27, 2.6.9)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: released (2.6.8-11)
 2.4.27-sarge-security: released (2.4.27-7)
 2.6.8: released (2.6.8-11)

Modified: patch-tracking/CVE-2004-1069
==============================================================================
--- patch-tracking/CVE-2004-1069	(original)
+++ patch-tracking/CVE-2004-1069	Sun Dec 25 19:52:09 2005
@@ -12,7 +12,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-11)
 2.4.27-sarge-security: N/A
 2.4.19-woody-security: N/A

Modified: patch-tracking/CVE-2004-1070
==============================================================================
--- patch-tracking/CVE-2004-1070	(original)
+++ patch-tracking/CVE-2004-1070	Sun Dec 25 19:52:09 2005
@@ -18,7 +18,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-9) [elf-loader-fixes.dpatch, elf-loader-fixes-the-return.dpatch]
 2.4.27-sarge-security: released (2.4.27-6) [097-elf_loader_overflow-1.diff, 097-elf_loader_overflow-2.diff, 097-elf_loader_overflow-3.diff, 097-elf_loader_overflow-4.diff]
 2.6.8: released (2.6.8-9) [elf-loader-fixes.dpatch, elf-loader-fixes-the-return.dpatch]

Modified: patch-tracking/CVE-2004-1071
==============================================================================
--- patch-tracking/CVE-2004-1071	(original)
+++ patch-tracking/CVE-2004-1071	Sun Dec 25 19:52:09 2005
@@ -17,7 +17,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-9) [elf-loader-fixes.dpatch, elf-loader-fixes-the-return.dpatch]
 2.4.27-sarge-security: released (2.4.27-6) [097-elf_loader_overflow-1.diff, 097-elf_loader_overflow-2.diff, 097-elf_loader_overflow-3.diff, 097-elf_loader_overflow-4.diff]
 2.6.8: released (2.6.8-9) [elf-loader-fixes.dpatch, elf-loader-fixes-the-return.dpatch]

Modified: patch-tracking/CVE-2004-1072
==============================================================================
--- patch-tracking/CVE-2004-1072	(original)
+++ patch-tracking/CVE-2004-1072	Sun Dec 25 19:52:09 2005
@@ -20,7 +20,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-9) [elf-loader-fixes.dpatch, elf-loader-fixes-the-return.dpatch]
 2.4.27-sarge-security: released (2.4.27-6) [097-elf_loader_overflow-1.diff, 097-elf_loader_overflow-2.diff, 097-elf_loader_overflow-3.diff, 097-elf_loader_overflow-4.diff]
 2.6.8: released (2.6.8-9) [elf-loader-fixes.dpatch, elf-loader-fixes-the-return.dpatch]

Modified: patch-tracking/CVE-2004-1073
==============================================================================
--- patch-tracking/CVE-2004-1073	(original)
+++ patch-tracking/CVE-2004-1073	Sun Dec 25 19:52:09 2005
@@ -16,7 +16,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-9) [elf-loader-fixes.dpatch, elf-loader-fixes-the-return.dpatch]
 2.4.27-sarge-security: released (2.4.27-6) [097-elf_loader_overflow-1.diff, 097-elf_loader_overflow-2.diff, 097-elf_loader_overflow-3.diff, 097-elf_loader_overflow-4.diff]
 2.6.8: released (2.6.8-9) [elf-loader-fixes.dpatch, elf-loader-fixes-the-return.dpatch]

Modified: patch-tracking/CVE-2004-1074
==============================================================================
--- patch-tracking/CVE-2004-1074	(original)
+++ patch-tracking/CVE-2004-1074	Sun Dec 25 19:52:09 2005
@@ -26,7 +26,7 @@
     setting up bss in a.out [fs/binfmt_aout.c, CAN-2004-1074]
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-11) [binfmt-huge-vma-dos.dpatch, binfmt-huge-vma-dos2.dpatch]
 2.4.27-sarge-security: released (2.4.27-7) [114-binfmt_aout-CVE-2004-1074.diff]
 2.6.8: released (2.6.8-11) [binfmt-huge-vma-dos.dpatch, binfmt-huge-vma-dos2.dpatch]

Modified: patch-tracking/CVE-2004-1137
==============================================================================
--- patch-tracking/CVE-2004-1137	(original)
+++ patch-tracking/CVE-2004-1137	Sun Dec 25 19:52:09 2005
@@ -27,7 +27,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: released (2.6.8-11) [igmp-src-list-fix.dpatch]
 2.4.27-sarge-security: released (2.4.27-7) [117-igmp-source-filter-fixes.patch]
 2.6.8: released (2.6.8-11) [igmp-src-list-fix.dpatch]

Modified: patch-tracking/CVE-2004-1144
==============================================================================
--- patch-tracking/CVE-2004-1144	(original)
+++ patch-tracking/CVE-2004-1144	Sun Dec 25 19:52:09 2005
@@ -12,7 +12,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: released (2.4.27-9) [138_amd64_syscall_vuln.diff]
 2.6.8: 

Modified: patch-tracking/CVE-2004-1151
==============================================================================
--- patch-tracking/CVE-2004-1151	(original)
+++ patch-tracking/CVE-2004-1151	Sun Dec 25 19:52:09 2005
@@ -15,7 +15,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-11) [arch-x86_64-sys32_ni-overflow.dpatch]
 2.4.27-sarge-security: 
 2.6.8: released (2.6.8-11) [arch-x86_64-sys32_ni-overflow.dpatch]

Modified: patch-tracking/CVE-2004-1234
==============================================================================
--- patch-tracking/CVE-2004-1234	(original)
+++ patch-tracking/CVE-2004-1234	Sun Dec 25 19:52:09 2005
@@ -17,7 +17,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2004-1235
==============================================================================
--- patch-tracking/CVE-2004-1235	(original)
+++ patch-tracking/CVE-2004-1235	Sun Dec 25 19:52:09 2005
@@ -31,7 +31,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-12) [028-do_brk_security_fixes.dpatch]
 2.4.27-sarge-security: released (2.4.27-8) [122_sec_brk-locked.diff]
 2.6.8: released (2.6.8-12) [028-do_brk_security_fixes.dpatch]

Modified: patch-tracking/CVE-2004-1333
==============================================================================
--- patch-tracking/CVE-2004-1333	(original)
+++ patch-tracking/CVE-2004-1333	Sun Dec 25 19:52:09 2005
@@ -20,7 +20,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-11) [vt-of-death.dpatch]
 2.4.27-sarge-security: released (2.4.27-9) [136_vc_resizing_overflow.diff]
 2.6.8: released (2.6.8-11) [vt-of-death.dpatch]

Modified: patch-tracking/CVE-2004-1335
==============================================================================
--- patch-tracking/CVE-2004-1335	(original)
+++ patch-tracking/CVE-2004-1335	Sun Dec 25 19:52:09 2005
@@ -16,7 +16,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.6.10)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: released (2.6.8-11) [fix-ip-options-leak.dpatch]
 2.4.27-sarge-security: released (2.4.27-9) [135_fix_ip_options_leak.diff]
 2.6.8: released (2.6.8-11) [fix-ip-options-leak.dpatch]

Modified: patch-tracking/CVE-2004-1337
==============================================================================
--- patch-tracking/CVE-2004-1337	(original)
+++ patch-tracking/CVE-2004-1337	Sun Dec 25 19:52:09 2005
@@ -15,7 +15,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-14) [025-track_dummy_capability.dpatch, 027-track_dummy_capability.dpatch]
 2.4.27-sarge-security: 
 2.6.8: released (2.6.8-14) [025-track_dummy_capability.dpatch, 027-track_dummy_capability.dpatch]

Modified: patch-tracking/CVE-2004-2302
==============================================================================
--- patch-tracking/CVE-2004-2302	(original)
+++ patch-tracking/CVE-2004-2302	Sun Dec 25 19:52:09 2005
@@ -12,7 +12,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.6.10)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: released (2.6.8-16sarge1)
 2.4.27-sarge-security: 
 2.4.19-woody-security: 

Modified: patch-tracking/CVE-2004-2536
==============================================================================
--- patch-tracking/CVE-2004-2536	(original)
+++ patch-tracking/CVE-2004-2536	Sun Dec 25 19:52:09 2005
@@ -16,7 +16,7 @@
  its just a 2.6 problem. I marked 2.4.27 and the woody kernels N/A
 Bugs: 
 upstream: released (2.6.6)
-2.6.14: N/A 
+linux-2.6: N/A 
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.6.8: N/A

Modified: patch-tracking/CVE-2004-2607
==============================================================================
--- patch-tracking/CVE-2004-2607	(original)
+++ patch-tracking/CVE-2004-2607	Sun Dec 25 19:52:09 2005
@@ -11,7 +11,7 @@
  jmm> I've requested a CVE assignment
 Bugs: 
 upstream: released (2.4.29-rc2)
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: released (2.4.27-8) [129_net_sdla_coverty.diff]
 2.6.8: 

Modified: patch-tracking/CVE-2005-0001
==============================================================================
--- patch-tracking/CVE-2005-0001	(original)
+++ patch-tracking/CVE-2005-0001	Sun Dec 25 19:52:09 2005
@@ -30,7 +30,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-13) [034-stack_resize_exploit.dpatch]
 2.4.27-sarge-security: released (2.4.27-8) [131_expand_stack_race.diff]
 2.6.8: released (2.6.8-13) [034-stack_resize_exploit.dpatch]

Modified: patch-tracking/CVE-2005-0003
==============================================================================
--- patch-tracking/CVE-2005-0003	(original)
+++ patch-tracking/CVE-2005-0003	Sun Dec 25 19:52:09 2005
@@ -22,7 +22,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.6.10)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: 
 2.4.27-sarge-security: released (2.4.27-9) [145_insert_vm_struct-no-BUG.patch]
 2.6.8: 

Modified: patch-tracking/CVE-2005-0124
==============================================================================
--- patch-tracking/CVE-2005-0124	(original)
+++ patch-tracking/CVE-2005-0124	Sun Dec 25 19:52:09 2005
@@ -16,7 +16,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2005-0135
==============================================================================
--- patch-tracking/CVE-2005-0135	(original)
+++ patch-tracking/CVE-2005-0135	Sun Dec 25 19:52:09 2005
@@ -15,7 +15,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-14) [ia64-unwind-fix.dpatch]
 2.4.27-sarge-security: 
 2.6.8: released (2.6.8-14) [ia64-unwind-fix.dpatch]

Modified: patch-tracking/CVE-2005-0136
==============================================================================
--- patch-tracking/CVE-2005-0136	(original)
+++ patch-tracking/CVE-2005-0136	Sun Dec 25 19:52:09 2005
@@ -5,7 +5,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-14) [ia64-ptrace-fixes.dpatch, ia64-ptrace-speedup.dpatch]
 2.4.27-sarge-security: 
 2.6.8: released (2.6.8-14) [ia64-ptrace-fixes.dpatch, ia64-ptrace-speedup.dpatch]

Modified: patch-tracking/CVE-2005-0137
==============================================================================
--- patch-tracking/CVE-2005-0137	(original)
+++ patch-tracking/CVE-2005-0137	Sun Dec 25 19:52:09 2005
@@ -10,7 +10,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: released (2.4.27-10) [165_arch-ia64-kernel-missing-sysctl.diff]
 2.6.8: 

Modified: patch-tracking/CVE-2005-0177
==============================================================================
--- patch-tracking/CVE-2005-0177	(original)
+++ patch-tracking/CVE-2005-0177	Sun Dec 25 19:52:09 2005
@@ -13,7 +13,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.6.8.1)
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-14) [nls-table-overflow.dpatch]
 2.4.27-sarge-security: 
 2.6.8: released (2.6.8-14) [nls-table-overflow.dpatch]

Modified: patch-tracking/CVE-2005-0178
==============================================================================
--- patch-tracking/CVE-2005-0178	(original)
+++ patch-tracking/CVE-2005-0178	Sun Dec 25 19:52:09 2005
@@ -14,7 +14,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.6.8.1)
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-14) [setsid-race.dpatch]
 2.4.27-sarge-security: 
 2.6.8: released (2.6.8-14) [setsid-race.dpatch]

Modified: patch-tracking/CVE-2005-0179
==============================================================================
--- patch-tracking/CVE-2005-0179	(original)
+++ patch-tracking/CVE-2005-0179	Sun Dec 25 19:52:09 2005
@@ -10,7 +10,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2005-0180
==============================================================================
--- patch-tracking/CVE-2005-0180	(original)
+++ patch-tracking/CVE-2005-0180	Sun Dec 25 19:52:09 2005
@@ -16,7 +16,7 @@
  jmm> intlen and outlen are unsigned ints
 Bugs: 
 upstream: 
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: released (2.6.8-12) [031-sg_scsi_ioctl_int_overflows.dpatch]
 2.4.27-sarge-security: N/A
 2.4.19-woody-security: 

Modified: patch-tracking/CVE-2005-0204
==============================================================================
--- patch-tracking/CVE-2005-0204	(original)
+++ patch-tracking/CVE-2005-0204	Sun Dec 25 19:52:09 2005
@@ -10,7 +10,7 @@
  jmm> 190_outs-2.diff had regressions
 Bugs: 296700
 upstream: 
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: released (2.6.8-14) [outs.dpatch]
 2.4.27-sarge-security: released (2.4.27-9) [143_outs.diff]
 2.4.27-sid: released (2.4.27-12) [190_outs-2.diff]

Modified: patch-tracking/CVE-2005-0207
==============================================================================
--- patch-tracking/CVE-2005-0207	(original)
+++ patch-tracking/CVE-2005-0207	Sun Dec 25 19:52:09 2005
@@ -14,7 +14,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-14) [nfs-O_DIRECT-fix.dpatch]
 2.4.27-sarge-security: 
 2.6.8: released (2.6.8-14) [nfs-O_DIRECT-fix.dpatch]

Modified: patch-tracking/CVE-2005-0209
==============================================================================
--- patch-tracking/CVE-2005-0209	(original)
+++ patch-tracking/CVE-2005-0209	Sun Dec 25 19:52:09 2005
@@ -13,7 +13,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-14) [skb-reset-ip_summed.dpatch]
 2.4.27-sarge-security: released (2.4.27-9) [134_skb_reset_ip_summed.diff]
 2.6.8: released (2.6.8-14) [skb-reset-ip_summed.dpatch]

Modified: patch-tracking/CVE-2005-0210
==============================================================================
--- patch-tracking/CVE-2005-0210	(original)
+++ patch-tracking/CVE-2005-0210	Sun Dec 25 19:52:09 2005
@@ -13,7 +13,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-15) [ip_copy_metadata_leak.dpatch, ip6_copy_metadata_leak.dpatch]
 2.4.27-sarge-security: released (2.4.27-9) [146_ip6_copy_metadata_leak.diff, 147_ip_copy_metadata_leak.diff]
 2.6.8: released (2.6.8-15) [ip_copy_metadata_leak.dpatch, ip6_copy_metadata_leak.dpatch]

Modified: patch-tracking/CVE-2005-0384
==============================================================================
--- patch-tracking/CVE-2005-0384	(original)
+++ patch-tracking/CVE-2005-0384	Sun Dec 25 19:52:09 2005
@@ -19,7 +19,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-15) [drivers-net-ppp_async-fix-dos.dpatch]
 2.4.27-sarge-security: released (2.4.27-9) [153_ppp_async_dos.diff]
 2.6.8: released (2.6.8-15) [drivers-net-ppp_async-fix-dos.dpatch]

Modified: patch-tracking/CVE-2005-0400
==============================================================================
--- patch-tracking/CVE-2005-0400	(original)
+++ patch-tracking/CVE-2005-0400	Sun Dec 25 19:52:09 2005
@@ -20,7 +20,7 @@
 Notes: 
 Bugs: 301799 303294
 upstream: released (2.6.11.6)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: released (2.6.8-16) [fs-ext2-info-leak.dpatch]
 2.4.27-sarge-security: released (2.4.27-10) [156_fs-ext2-info-leak.diff]
 2.6.8: released (2.6.8-16) [fs-ext2-info-leak.dpatch]

Modified: patch-tracking/CVE-2005-0449
==============================================================================
--- patch-tracking/CVE-2005-0449	(original)
+++ patch-tracking/CVE-2005-0449	Sun Dec 25 19:52:09 2005
@@ -15,7 +15,7 @@
  150_private_fragment_queues-[1,2].diff are awaiting a 2.4.27 ABI event
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: needed
 2.4.27-sarge-security: needed
 2.6.8: 

Modified: patch-tracking/CVE-2005-0489
==============================================================================
--- patch-tracking/CVE-2005-0489	(original)
+++ patch-tracking/CVE-2005-0489	Sun Dec 25 19:52:09 2005
@@ -7,7 +7,7 @@
  still marked **RESERVED**
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2005-0504
==============================================================================
--- patch-tracking/CVE-2005-0504	(original)
+++ patch-tracking/CVE-2005-0504	Sun Dec 25 19:52:09 2005
@@ -7,7 +7,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-12) [030-moxa_user_copy_checking.dpatch]
 2.4.27-sarge-security: released (2.4.27-8) [125_moxa_bound_checking.diff]
 2.6.8: released (2.6.8-12) [030-moxa_user_copy_checking.dpatch]

Modified: patch-tracking/CVE-2005-0528
==============================================================================
--- patch-tracking/CVE-2005-0528	(original)
+++ patch-tracking/CVE-2005-0528	Sun Dec 25 19:52:09 2005
@@ -12,7 +12,7 @@
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0528
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2005-0529
==============================================================================
--- patch-tracking/CVE-2005-0529	(original)
+++ patch-tracking/CVE-2005-0529	Sun Dec 25 19:52:09 2005
@@ -18,7 +18,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-14) [115-proc_file_read_nbytes_signedness_fix.dpatch]
 2.4.27-sarge-security: 
 2.6.8: released (2.6.8-14) [115-proc_file_read_nbytes_signedness_fix.dpatch]

Modified: patch-tracking/CVE-2005-0530
==============================================================================
--- patch-tracking/CVE-2005-0530	(original)
+++ patch-tracking/CVE-2005-0530	Sun Dec 25 19:52:09 2005
@@ -17,7 +17,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-14) [116-n_tty_copy_from_read_buf_signedness_fixes.dpatch]
 2.4.27-sarge-security: 
 2.6.8: released (2.6.8-14) [116-n_tty_copy_from_read_buf_signedness_fixes.dpatch]

Modified: patch-tracking/CVE-2005-0531
==============================================================================
--- patch-tracking/CVE-2005-0531	(original)
+++ patch-tracking/CVE-2005-0531	Sun Dec 25 19:52:09 2005
@@ -15,7 +15,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-14) [123-atm_get_addr_signedness_fix.dpatch]
 2.4.27-sarge-security: released (2.4.27-9) [151_atm_get_addr_signedness_fix.diff]
 2.6.8: released (2.6.8-14) [123-atm_get_addr_signedness_fix.dpatch]

Modified: patch-tracking/CVE-2005-0532
==============================================================================
--- patch-tracking/CVE-2005-0532	(original)
+++ patch-tracking/CVE-2005-0532	Sun Dec 25 19:52:09 2005
@@ -16,7 +16,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-14) [117-reiserfs_file_64bit_size_t_fixes.dpatch]
 2.4.27-sarge-security: 
 2.6.8: released (2.6.8-14) [117-reiserfs_file_64bit_size_t_fixes.dpatch]

Modified: patch-tracking/CVE-2005-0749
==============================================================================
--- patch-tracking/CVE-2005-0749	(original)
+++ patch-tracking/CVE-2005-0749	Sun Dec 25 19:52:09 2005
@@ -16,7 +16,7 @@
 Notes: 
 Bugs: 301799, 303498
 upstream: released (2.6.11.6)
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-16) [fs-binfmt_elf-dos.dpatch]
 2.4.27-sarge-security: released (2.4.27-10) [158_fs-binfmt_elf-dos.diff]
 2.6.8: released (2.6.8-16) [fs-binfmt_elf-dos.dpatch]

Modified: patch-tracking/CVE-2005-0750
==============================================================================
--- patch-tracking/CVE-2005-0750	(original)
+++ patch-tracking/CVE-2005-0750	Sun Dec 25 19:52:09 2005
@@ -20,7 +20,7 @@
 Notes: 
 Bugs: 301799
 upstream: released (2.6.11.5)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: released (2.6.8-16) [net-bluetooth-signdness-fix.dpatch]
 2.4.27-sarge-security: released (2.4.27-10) [155_net-bluetooth-signdness-fix.diff]
 2.6.8: released (2.6.8-16) [net-bluetooth-signdness-fix.dpatch]

Modified: patch-tracking/CVE-2005-0756
==============================================================================
--- patch-tracking/CVE-2005-0756	(original)
+++ patch-tracking/CVE-2005-0756	Sun Dec 25 19:52:09 2005
@@ -7,7 +7,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-16sarge1) [arch-x86_64-kernel-ptrace-canonical-rip-2.dpatch]
 2.4.27-sarge-security: released (2.4.27-10sarge1)
 2.4.19-woody-security: 

Modified: patch-tracking/CVE-2005-0757
==============================================================================
--- patch-tracking/CVE-2005-0757	(original)
+++ patch-tracking/CVE-2005-0757	Sun Dec 25 19:52:09 2005
@@ -10,7 +10,7 @@
 Bugs: 
 upstream: 
 2.4.27-sarge-security: released (2.4.27-10sarge1)
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-16sarge1) [fs-ext3-64bit-offset.dpatch]
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-0815
==============================================================================
--- patch-tracking/CVE-2005-0815	(original)
+++ patch-tracking/CVE-2005-0815	Sun Dec 25 19:52:09 2005
@@ -16,7 +16,7 @@
 Notes: 
 Bugs: 301799
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-16) [fs-isofs-range-check-1.dpatch, fs-isofs-range-check-2.dpatch, fs-isofs-range-check-3.dpatch]
 2.4.27-sarge-security: released (2.4.27-10) [157_fs-isofs-range-check-1.diff, 157_fs-isofs-range-check-2.diff, 157_fs-isofs-range-check-3.diff]
 2.6.8: released (2.6.8-16) [fs-isofs-range-check-1.dpatch, fs-isofs-range-check-2.dpatch, fs-isofs-range-check-3.dpatch]

Modified: patch-tracking/CVE-2005-0839
==============================================================================
--- patch-tracking/CVE-2005-0839	(original)
+++ patch-tracking/CVE-2005-0839	Sun Dec 25 19:52:09 2005
@@ -10,7 +10,7 @@
 Notes: 
 Bugs: 301372
 upstream: released (2.6.11)
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-16) [drivers-input-serio-nmouse.dpatch]
 2.4.27-sarge-security: 
 2.6.8: released (2.6.8-16) [drivers-input-serio-nmouse.dpatch]

Modified: patch-tracking/CVE-2005-1041
==============================================================================
--- patch-tracking/CVE-2005-1041	(original)
+++ patch-tracking/CVE-2005-1041	Sun Dec 25 19:52:09 2005
@@ -10,7 +10,7 @@
  horms> for 2.4.27, and it seems fine.
 Bugs: 304548
 upstream: released (2.6.11.5)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: released (2.6.8-16)
 2.4.27-sarge-security: N/A
 2.4.19-woody-security: 

Modified: patch-tracking/CVE-2005-1263
==============================================================================
--- patch-tracking/CVE-2005-1263	(original)
+++ patch-tracking/CVE-2005-1263	Sun Dec 25 19:52:09 2005
@@ -16,7 +16,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.2.27-rc2, 2.4.31-pre1, 2.6.12-rc4)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: released (2.6.8-16)
 2.4.27-sarge-security: released (2.4.27-10)
 2.6.8: released (2.6.8-16)

Modified: patch-tracking/CVE-2005-1264
==============================================================================
--- patch-tracking/CVE-2005-1264	(original)
+++ patch-tracking/CVE-2005-1264	Sun Dec 25 19:52:09 2005
@@ -17,7 +17,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.6.11.10)
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-16) [drivers-block-raw-ioctl.dpatch]
 2.4.27-sarge-security: 
 2.6.8: released (2.6.8-16) [drivers-block-raw-ioctl.dpatch]

Modified: patch-tracking/CVE-2005-1265
==============================================================================
--- patch-tracking/CVE-2005-1265	(original)
+++ patch-tracking/CVE-2005-1265	Sun Dec 25 19:52:09 2005
@@ -8,7 +8,7 @@
  jmm> I've pulled the patch by Linus from the above-mentioned Ubuntu advisory
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-16sarge1) [mm-mmap-range-test.dpatch]
 2.4.27-sarge-security: 
 2.4.19-woody-security: 

Modified: patch-tracking/CVE-2005-1369
==============================================================================
--- patch-tracking/CVE-2005-1369	(original)
+++ patch-tracking/CVE-2005-1369	Sun Dec 25 19:52:09 2005
@@ -12,7 +12,7 @@
  jmm> These drivers are not present in 2.4
 Bugs: 307552
 upstream: released (2.6.11.8)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: pending (2.6.8-16)
 2.4.27-sarge-security: N/A 
 2.4.19-woody-security: 

Modified: patch-tracking/CVE-2005-1589
==============================================================================
--- patch-tracking/CVE-2005-1589	(original)
+++ patch-tracking/CVE-2005-1589	Sun Dec 25 19:52:09 2005
@@ -24,7 +24,7 @@
  horms> 2.4.27 does not appear to be vulnerable to either of these problems.
 Bugs: 309429
 upstream: released (2.6.11.10), released (2.6.12-rc5)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: pending (2.6.8-15sarge1)
 2.4.27-sarge-security: N/A
 2.4.19-woody-security: 

Modified: patch-tracking/CVE-2005-1761
==============================================================================
--- patch-tracking/CVE-2005-1761	(original)
+++ patch-tracking/CVE-2005-1761	Sun Dec 25 19:52:09 2005
@@ -10,7 +10,7 @@
  jmm> This uses arch-ia64-ptrace-restore_sigcontext.dpatch, correct?
 Bugs: 
 upstream: released (2.6.12.1)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: released (2.6.8-16sarge1) [arch-x86_64-private-tss.dpatch, arch-x86_64-nmi.dpatch, arch-ia64-ptrace-getregs-putregs.dpatch]
 2.4.27-sarge-security: 
 2.4.19-woody-security: 

Modified: patch-tracking/CVE-2005-1762
==============================================================================
--- patch-tracking/CVE-2005-1762	(original)
+++ patch-tracking/CVE-2005-1762	Sun Dec 25 19:52:09 2005
@@ -10,7 +10,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.6.12-rc5)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: released (2.6.8-16sarge1) [arch-x86_64-kernel-ptrace-canonical-rip-1.dpatch] 
 2.4.27-sarge-security: released (2.4.27-10sarge1) [169_arch-x86_64-kernel-ptrace-canonical-rip-1.dpatch]
 2.4.19-woody-security: 

Modified: patch-tracking/CVE-2005-1763
==============================================================================
--- patch-tracking/CVE-2005-1763	(original)
+++ patch-tracking/CVE-2005-1763	Sun Dec 25 19:52:09 2005
@@ -7,7 +7,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.6.12-rc5)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: released (2.6.8-16sarge1) [arch-x86_64-kernel-ptrace-boundary-check.dpatch]
 2.4.27-sarge-security: 
 2.4.19-woody-security: 

Modified: patch-tracking/CVE-2005-1764
==============================================================================
--- patch-tracking/CVE-2005-1764	(original)
+++ patch-tracking/CVE-2005-1764	Sun Dec 25 19:52:09 2005
@@ -21,7 +21,7 @@
 2.6.8-sarge-security: N/A
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: N/A
-2.6.14: 
+linux-2.6: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-1765
==============================================================================
--- patch-tracking/CVE-2005-1765	(original)
+++ patch-tracking/CVE-2005-1765	Sun Dec 25 19:52:09 2005
@@ -10,7 +10,7 @@
  jmm> I've extracted the patch from the Ubuntu update (CVE-2005-1765.patch)
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-16sarge1) [arch-x86_64-mm-mmap.dpatch]
 2.4.27-sarge-security: 
 2.4.19-woody-security: 

Modified: patch-tracking/CVE-2005-1767
==============================================================================
--- patch-tracking/CVE-2005-1767	(original)
+++ patch-tracking/CVE-2005-1767	Sun Dec 25 19:52:09 2005
@@ -11,7 +11,7 @@
  Horms> This is amd64 specific, and thus should not affect 2.4
 Bugs: 
 upstream: 2.6.12/2.4.32
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: released (2.6.8-16sarge1) [arch-x86_64-kernel-stack-faults.dpatch, arch-x86_64-nmi.dpatch, arch-x86_64-kernel-stack-faults.dpatch]
 2.6.8: pending (2.6.8-17) [arch-x86_64-kernel-stack-faults.dpatch, arch-x86_64-nmi.dpatch, arch-x86_64-private-tss.dpatch]
 2.4.27-sid/sarge: released (2.4.27-11)

Modified: patch-tracking/CVE-2005-1768
==============================================================================
--- patch-tracking/CVE-2005-1768	(original)
+++ patch-tracking/CVE-2005-1768	Sun Dec 25 19:52:09 2005
@@ -25,7 +25,7 @@
 2.6.8-sarge-security: N/A
 2.4.27-sid/sarge: released (2.4.27-11)
 2.4.27-sarge-security: released (2.4.27-10sarge1)
-2.6.14: N/A
+linux-2.6: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-1913
==============================================================================
--- patch-tracking/CVE-2005-1913	(original)
+++ patch-tracking/CVE-2005-1913	Sun Dec 25 19:52:09 2005
@@ -24,12 +24,11 @@
  not exist.
 Notes: 
 upstream: released (2.6.12.1)
-2.6.12: released (2.6.12-1) [linux-2.6.12.1.patch]
 2.6.8-sarge: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: N/A
-2.6.14: 
+linux-2.6: released (2.6.12-1) [linux-2.6.12.1.patch]
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-2098
==============================================================================
--- patch-tracking/CVE-2005-2098	(original)
+++ patch-tracking/CVE-2005-2098	Sun Dec 25 19:52:09 2005
@@ -20,13 +20,11 @@
  session keyring (1) with an empty name string, (2) with a long name
  string, (3) with the key quota reached, or (4) ENOMEM.
 upstream: released (2.6.12.5)
-2.6.13: N/A
-2.6.12: released (2.6.12-3) [linux-2.6.12.5.patch]
 2.6.8-sarge: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: N/A
-2.6.14: 
+linux-2.6: released (2.6.12-3) [linux-2.6.12.5.patch]
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-2099
==============================================================================
--- patch-tracking/CVE-2005-2099	(original)
+++ patch-tracking/CVE-2005-2099	Sun Dec 25 19:52:09 2005
@@ -19,13 +19,11 @@
  with a payload that is not empty, which causes the creation to fail,
  leading toa null dereference in the keyring destructor.
 upstream: released (2.6.12.5)
-2.6.13: N/A
-2.6.12: released (2.6.12-3) [linux-2.6.12.5.patch]
 2.6.8-sarge: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: N/A
-2.6.14: 
+linux-2.6: released (2.6.12-3) [linux-2.6.12.5.patch]
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-2100
==============================================================================
--- patch-tracking/CVE-2005-2100	(original)
+++ patch-tracking/CVE-2005-2100	Sun Dec 25 19:52:09 2005
@@ -12,7 +12,7 @@
  in Upstream or Debian Kernels.
 Bugs: 
 upstream: 
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.6.8: N/A

Modified: patch-tracking/CVE-2005-2456
==============================================================================
--- patch-tracking/CVE-2005-2456	(original)
+++ patch-tracking/CVE-2005-2456	Sun Dec 25 19:52:09 2005
@@ -20,7 +20,7 @@
 Notes: 
 Bugs: 321401
 upstream: 
-2.6.14: released (2.6.12-2)
+linux-2.6: released (2.6.12-2)
 2.6.8-sarge-security: released (2.6.8-16sarge1)
 2.4.27-sarge-security: released (2.4.27-10sarge1) [176_ipsec-array-overflow.diff]
 2.4.19-woody-security: 

Modified: patch-tracking/CVE-2005-2457
==============================================================================
--- patch-tracking/CVE-2005-2457	(original)
+++ patch-tracking/CVE-2005-2457	Sun Dec 25 19:52:09 2005
@@ -14,13 +14,11 @@
  cause a denial of service (kernel crash) via a crafted compressed ISO
  file system.
 upstream: released (2.6.12.5)
-2.6.13: N/A
-2.6.12: released (2.6.12-3) [linux-2.6.12.5.patch]
 2.6.8-sarge: pending [zisofs.dpatch]
 2.6.8-sarge-security: pending (2.6.8-16sarge2) [zisofs.diff]
 2.4.27-sid/sarge: pending [187_zisofs-2.diff]
 2.4.27-sarge-security: pending (2.4.27-10sarge2) [187_zisofs-2.diff]
-2.6.14: 
+linux-2.6: released (2.6.12-3) [linux-2.6.12.5.patch]
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-2458
==============================================================================
--- patch-tracking/CVE-2005-2458	(original)
+++ patch-tracking/CVE-2005-2458	Sun Dec 25 19:52:09 2005
@@ -19,12 +19,11 @@
  allows remote attackers to cause a denial of service (kernel crash)
  via a compressed file with "improper tables".
 upstream: released (2.6.12.5)
-2.6.12: released (2.6.12-3) [linux-2.6.12.5.patch]
+linux-2.6: released (2.6.12-3) [linux-2.6.12.5.patch]
 2.6.8-sarge: pending [linux-zlib-fixes.dpatch]
 2.6.8-sarge-security: released (2.6.8-16sarge1) [linux-zlib-fixes.dpatch]
 2.4.27-sid/sarge: released (2.4.27-11) [182_linux-zlib-fixes.diff]
 2.4.27-sarge-security: released (2.4.27-10sarge1) [182_linux-zlib-fixes.diff]
-2.6.14: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-2459
==============================================================================
--- patch-tracking/CVE-2005-2459	(original)
+++ patch-tracking/CVE-2005-2459	Sun Dec 25 19:52:09 2005
@@ -21,13 +21,11 @@
  jmm> The changelog for 2.4.27-11 marks this as fixed, yet it's tracked as
  jmm> N/A? Thich version is correct?
 upstream: released (2.6.12.6)
-2.6.13: N/A
-2.6.12: N/A
+linux-2.6: 
 2.6.8-sarge: N/A
 2.6.8-sarge-security: released (2.6.8-16sarge1) [linux-zlib-fixes.dpatch]
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: released (2.4.27-10sarge1) [182_linux-zlib-fixes.diff]
-2.6.14: 
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-2490
==============================================================================
--- patch-tracking/CVE-2005-2490	(original)
+++ patch-tracking/CVE-2005-2490	Sun Dec 25 19:52:09 2005
@@ -23,13 +23,11 @@
  by calling sendmsg and modifying the message contents in another
  thread.
 upstream: released (2.6.13.1)
-2.6.13: released (2.6.13-1) [linux-2.6.13.1.patch]
-2.6.12: released (2.6.12-7) [sendmsg-stackoverflow.patch]
+linux-2.6: released (2.6.12-7, 2.6.13-1) [sendmsg-stackoverflow.patch, linux-2.6.13.1.patch]
 2.6.8-sarge: pending
 2.6.8-sarge-security: pending (2.6.8-16sarge2) [sendmsg-stackoverflow.dpatch]
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: N/A
-2.6.14: 
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-2492
==============================================================================
--- patch-tracking/CVE-2005-2492	(original)
+++ patch-tracking/CVE-2005-2492	Sun Dec 25 19:52:09 2005
@@ -22,13 +22,11 @@
  allows local users to cause a denial of service (change hardware
  state) or read from arbitrary memory via crafted input.
 upstream: released (2.6.13.1)
-2.6.13: released (2.6.13-1) [linux-2.6.13.1.patch]
-2.6.12: released (2.6.12-7): [sendmsg-DoS.patch]
+linux-2.6: released (2.6.12-7, 2.6.13-1) [sendmsg-DoS.patch, linux-2.6.13.1.patch]
 2.6.8-sarge: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: N/A
-2.6.14: 
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-2548
==============================================================================
--- patch-tracking/CVE-2005-2548	(original)
+++ patch-tracking/CVE-2005-2548	Sun Dec 25 19:52:09 2005
@@ -18,7 +18,7 @@
 2.6.8-sarge-security: released (2.6.8-16sarge1) [vlan-mii-ioctl.dpatch]
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: N/A
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-2553
==============================================================================
--- patch-tracking/CVE-2005-2553	(original)
+++ patch-tracking/CVE-2005-2553	Sun Dec 25 19:52:09 2005
@@ -11,13 +11,11 @@
  the -i option on a 64-bit executable program.
 Bugs: 
 upstream: released (2.4.29)
-2.6.13: N/A
-2.6.12: N/A
+linux-2.6: N/A
 2.6.8-sarge: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sid/sarge: pending [184_arch-x86_64-ia32-ptrace32-oops.diff]
 2.4.27-sarge-security: released (2.4.27-10sarge1) [184_arch-x86_64-ia32-ptrace32-oops.diff]
-2.6.14: 
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-2555
==============================================================================
--- patch-tracking/CVE-2005-2555	(original)
+++ patch-tracking/CVE-2005-2555	Sun Dec 25 19:52:09 2005
@@ -9,7 +9,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.6.13)
-2.6.14: pending
+linux-2.6: pending
 2.6.8-sarge-security: pending (2.6.8-16sarge2)
 2.4.27-sarge-security: pending (2.4.27-10sarge2)
 2.6.8: 

Modified: patch-tracking/CVE-2005-2708
==============================================================================
--- patch-tracking/CVE-2005-2708	(original)
+++ patch-tracking/CVE-2005-2708	Sun Dec 25 19:52:09 2005
@@ -12,7 +12,7 @@
  Debian
 Bugs: 
 upstream: 
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.6.8: N/A

Modified: patch-tracking/CVE-2005-2709
==============================================================================
--- patch-tracking/CVE-2005-2709	(original)
+++ patch-tracking/CVE-2005-2709	Sun Dec 25 19:52:09 2005
@@ -18,12 +18,10 @@
  **THIS IS AN ABI CHANGE**
 Bug: 
 upstream: pending (2.6.14.1)
-2.6.13: needed
-2.6.12: 
+linux-2.6: 
 2.6.8-sarge-security: needed [sysctl-unregistration-oops.dpatch]
 2.4.27-sarge-security: needed [196_sysctl-unregistration-oops.patch]
 2.4.27: 
-2.6.14: 
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-2800
==============================================================================
--- patch-tracking/CVE-2005-2800	(original)
+++ patch-tracking/CVE-2005-2800	Sun Dec 25 19:52:09 2005
@@ -11,7 +11,7 @@
  dannf> seq_file is a 2.6ism, so marking 2.4 as N/A
 Bugs: 
 upstream: released (2.6.12.6)
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: pending (2.6.8-16sarge2)
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2005-2801
==============================================================================
--- patch-tracking/CVE-2005-2801	(original)
+++ patch-tracking/CVE-2005-2801	Sun Dec 25 19:52:09 2005
@@ -16,7 +16,7 @@
 2.6.8-sarge-security: released (2.6.8-16-sarge1) [fs_ext2_ext3_xattr-sharing.dpatch]
 2.4.27-sarge-security: released (2.4.27-10sarge1) [178_fs_ext2_ext3_xattr-sharing.diff]
 2.4.27-sid: released (2.4.27-12) [178_fs_ext2_ext3_xattr-sharing.diff]
-2.6.14: N/A
+linux-2.6: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-2872
==============================================================================
--- patch-tracking/CVE-2005-2872	(original)
+++ patch-tracking/CVE-2005-2872	Sun Dec 25 19:52:09 2005
@@ -22,7 +22,7 @@
 2.6.8-sarge-security: released (2.6.8-16sarge1) [net-ipv4-netfilter-ip_recent-last_pkts.dpatch]
 2.4.27-sid/sarge: released (2.4.27-12) [179_net-ipv4-netfilter-ip_recent-last_pkts.diff]
 2.4.27-sarge-security: released (2.4.27-10sarge1) [179_net-ipv4-netfilter-ip_recent-last_pkts.diff]
-2.6.14: N/A
+linux-2.6: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-2873
==============================================================================
--- patch-tracking/CVE-2005-2873	(original)
+++ patch-tracking/CVE-2005-2873	Sun Dec 25 19:52:09 2005
@@ -19,13 +19,11 @@
  http://lists.debian.org/debian-kernel/2005/09/msg00257.html
 upstream: vulnerable
 Bugs: 332381, 332231, 332228
-2.6.13: needed
-2.6.12: needed
+linux-2.6: needed
 2.6.8-sarge: needed
 2.6.8-sarge-security: needed
 2.4.27-sid/sarge: needed
 2.4.27-sarge-security: needed
-2.6.14: 
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-2973
==============================================================================
--- patch-tracking/CVE-2005-2973	(original)
+++ patch-tracking/CVE-2005-2973	Sun Dec 25 19:52:09 2005
@@ -13,7 +13,7 @@
 2.6.8-sarge: pending (2.6.8-17)
 2.4.27-sarge-security: pending (2.4.27-10sarge2) [195_net-ipv6-udp_v6_get_port-loop.diff]
 2.4.27-sarge/sid: pending (2.4.27-12)
-2.6.14: 
+linux-2.6: 
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-3044
==============================================================================
--- patch-tracking/CVE-2005-3044	(original)
+++ patch-tracking/CVE-2005-3044	Sun Dec 25 19:52:09 2005
@@ -20,13 +20,11 @@
  dannf> kernel out of our tree, so I marked 2.4 "needed" below.  Lowest of the
  dannf> low priorities though...
 upstream: released (2.6.13.2)
-2.6.13: released (2.6.13-1) [linux-2.6.13.2.patch]
-2.6.12: released (2.6.12-7) [lost-fput-in-32bit-ioctl-on-x86-64.patch]
+linux-2.6: released (2.6.12-7, 2.6.13-1) [lost-fput-in-32bit-ioctl-on-x86-64.patch, linux-2.6.13.2.patch]
 2.6.8-sarge: pending [lost-fput-in-32bit-ioctl-on-x86-64.dpatch]
 2.6.8-sarge-security: pending (2.6.8-16sarge2) [lost-fput-in-32bit-ioctl-on-x86-64.dpatch]
 2.4.27-sid/sarge: needed
 2.4.27-sarge-security: needed
-2.6.14: 
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-3053
==============================================================================
--- patch-tracking/CVE-2005-3053	(original)
+++ patch-tracking/CVE-2005-3053	Sun Dec 25 19:52:09 2005
@@ -15,12 +15,11 @@
 Notes: 
  horms> http://lkml.org/lkml/2005/9/30/218
 upstream: released (2.6.12.5)
-2.6.12: released (2.6.12-3)
+linux-2.6: released (2.6.12-3)
 2.6.8-sarge: pending [mempolicy-check-mode.dpatch]
 2.6.8-sarge-security: pending (2.6.8-16sarge2) [mempolicy-check-mode.dpatch]
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: N/A
-2.6.14: 
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-3055
==============================================================================
--- patch-tracking/CVE-2005-3055	(original)
+++ patch-tracking/CVE-2005-3055	Sun Dec 25 19:52:09 2005
@@ -20,13 +20,11 @@
  horms> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=330287;msg=21
 upstream: pending
 Bugs: 330287, 33259
-2.6.13: needed
-2.6.12: needed
+linux-2.6: needed
 2.6.8-sarge: needed
 2.6.8-sarge-security: needed
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: N/A
-2.6.14: 
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-3105
==============================================================================
--- patch-tracking/CVE-2005-3105	(original)
+++ patch-tracking/CVE-2005-3105	Sun Dec 25 19:52:09 2005
@@ -26,7 +26,7 @@
 2.6.8-sarge-security: released (2.6.8-16sarge1) [mckinley_icache.dpatch]
 2.4.27-sid/sarge: needed
 2.4.27-sarge-security: needed
-2.6.14: N/A
+linux-2.6: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3106
==============================================================================
--- patch-tracking/CVE-2005-3106	(original)
+++ patch-tracking/CVE-2005-3106	Sun Dec 25 19:52:09 2005
@@ -24,7 +24,7 @@
 2.6.8-sarge-security: released (2.6.8-16sarge1) [fs-exec-ptrace-core-exec-race.dpatch]
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: N/A
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-3107
==============================================================================
--- patch-tracking/CVE-2005-3107	(original)
+++ patch-tracking/CVE-2005-3107	Sun Dec 25 19:52:09 2005
@@ -24,7 +24,7 @@
 2.6.8-sarge-security: released (2.6.8-16sarge1) [fs-exec-ptrace-deadlock.dpatch]
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: N/A
-2.6.14: N/A
+linux-2.6: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3108
==============================================================================
--- patch-tracking/CVE-2005-3108	(original)
+++ patch-tracking/CVE-2005-3108	Sun Dec 25 19:52:09 2005
@@ -22,7 +22,7 @@
 2.6.8-sarge-security: released (2.6.8-16sarge1) [arch-x86_64-mm-ioremap-page-lookup.dpatch]
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: N/A
-2.6.14: N/A
+linux-2.6: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3109
==============================================================================
--- patch-tracking/CVE-2005-3109	(original)
+++ patch-tracking/CVE-2005-3109	Sun Dec 25 19:52:09 2005
@@ -21,7 +21,7 @@
 2.6.8-sarge-security: released (2.6.8-16sarge1) [fs-hfs-oops-and-leak.dpatch]
 2.4.27-sid/sarge: 
 2.4.27-sarge-security: 
-2.6.14: N/A
+linux-2.6: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3110
==============================================================================
--- patch-tracking/CVE-2005-3110	(original)
+++ patch-tracking/CVE-2005-3110	Sun Dec 25 19:52:09 2005
@@ -23,7 +23,7 @@
 2.6.8-sarge-security: released (2.6.8-16sarge1) [net-bridge-netfilter-etables-smp-race.dpatch]
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: N/A
-2.6.14: N/A
+linux-2.6: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3119
==============================================================================
--- patch-tracking/CVE-2005-3119	(original)
+++ patch-tracking/CVE-2005-3119	Sun Dec 25 19:52:09 2005
@@ -17,12 +17,10 @@
  .
  dannf> This file doesn't exist in 2.6.8, so sarge isn't vulnerable
 upstream: released (2.6.13.4, 2.6.14)
-2.6.13: needed
-2.6.12: N/A
+linux-2.6: needed
 2.6.8-sarge-security: N/A
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: N/A
-2.6.14: N/A
 2.6.8: N/A
 2.4.19-woody-security: N/A
 2.4.18-woody-security: N/A

Modified: patch-tracking/CVE-2005-3179
==============================================================================
--- patch-tracking/CVE-2005-3179	(original)
+++ patch-tracking/CVE-2005-3179	Sun Dec 25 19:52:09 2005
@@ -14,13 +14,11 @@
  > > Please consider for next 2.6.13, it is a minor security issue allowing
  > > users to turn on drm debugging when they shouldn't...
 upstream: released (2.6.13.4)
-2.6.13: pending
-2.6.12: pending [drm-module_param-permissions-fix.patch]
+linux-2.6: pending [drm-module_param-permissions-fix.patch]
 2.6.8-sarge: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: N/A
-2.6.14: 
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-3180
==============================================================================
--- patch-tracking/CVE-2005-3180	(original)
+++ patch-tracking/CVE-2005-3180	Sun Dec 25 19:52:09 2005
@@ -14,13 +14,11 @@
  > > the system memory.  This happens because data is not padded with zeroes
  > > when its length needs to be increased.
 upstream: released (2.6.13.4)
-2.6.13: pending
-2.6.12: pending [orinoco-info-leak.patch]
+linux-2.6: pending [orinoco-info-leak.patch]
 2.6.8-sarge: pending [orinoco-info-leak.dpatch]
 2.6.8-sarge-security: pending (2.6.8-16sarge2) [orinoco-info-leak.dpatch]
 2.4.27-sid/sarge: released (2.4.27-12) [192_orinoco-info-leak.diff]
 2.4.27-sarge-security: pending [192_orinoco-info-leak.diff]
-2.6.14: 
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-3181
==============================================================================
--- patch-tracking/CVE-2005-3181	(original)
+++ patch-tracking/CVE-2005-3181	Sun Dec 25 19:52:09 2005
@@ -16,7 +16,7 @@
 2.6.8-sarge: pending (2.6.8-17)
 2.4.27-sarge-security: N/A
 2.4.27-sarge/sid: N/A
-2.6.14: 
+linux-2.6: 
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-3257
==============================================================================
--- patch-tracking/CVE-2005-3257	(original)
+++ patch-tracking/CVE-2005-3257	Sun Dec 25 19:52:09 2005
@@ -17,7 +17,7 @@
 2.6.8-sarge: 
 2.4.27-sarge-security: pending (2.4.27-10sarge2) [197_setkeys-needs-root-1.diff, 197_setkeys-needs-root-2.diff]
 2.4.27-sarge/sid: 
-2.6.14: pending (2.6.14-4) [setkeys-needs-root-1.patch, setkeys-needs-root-2.patch]
+linux-2.6: pending (2.6.14-4) [setkeys-needs-root-1.patch, setkeys-needs-root-2.patch]
 2.6.8: needed
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-3271
==============================================================================
--- patch-tracking/CVE-2005-3271	(original)
+++ patch-tracking/CVE-2005-3271	Sun Dec 25 19:52:09 2005
@@ -14,7 +14,7 @@
 upstream: released (2.6.9)
 2.6.8-sarge-security: released (2.6.8-16sarge1) [fs-exec-posix-timers-leak-1.dpatch]
 2.4.27-sarge-security: N/A
-2.6.14: N/A
+linux-2.6: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3272
==============================================================================
--- patch-tracking/CVE-2005-3272	(original)
+++ patch-tracking/CVE-2005-3272	Sun Dec 25 19:52:09 2005
@@ -10,7 +10,7 @@
 upstream: released (2.6.12)
 2.6.8-sarge-security: released (2.6.8-16sarge1) [net-bridge-forwarding-poison-1.dpatch, net-bridge-mangle-oops-1.dpatch, net-bridge-mangle-oops-2.dpatch]
 2.4.27-sarge-security: N/A
-2.6.14: released (2.6.12-1)
+linux-2.6: released (2.6.12-1)
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3273
==============================================================================
--- patch-tracking/CVE-2005-3273	(original)
+++ patch-tracking/CVE-2005-3273	Sun Dec 25 19:52:09 2005
@@ -12,7 +12,7 @@
 upstream: released (2.6.12)
 2.6.8-sarge-security: released (2.6.8-16sarge1) [net-rose-ndigis-verify.dpatch]
 2.4.27-sarge-security: N/A
-2.6.14: released (2.6.12-1)
+linux-2.6: released (2.6.12-1)
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3274
==============================================================================
--- patch-tracking/CVE-2005-3274	(original)
+++ patch-tracking/CVE-2005-3274	Sun Dec 25 19:52:09 2005
@@ -12,11 +12,9 @@
  appropriate lock is acquired.
 Bugs: 
 upstream: released (2.6.13, 2.4.32-pre2)
-2.6.13: N/A
-2.6.12: 
+linux-2.6: released (2.6.13-1)
 2.6.8-sarge-security: released (2.6.8-16sarge1) [net-ipv4-ipvs-conn_tab-race.dpatch]
 2.4.27-sarge-security: pending (2.4.27-10sarge1)
-2.6.14: 
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-3275
==============================================================================
--- patch-tracking/CVE-2005-3275	(original)
+++ patch-tracking/CVE-2005-3275	Sun Dec 25 19:52:09 2005
@@ -13,7 +13,7 @@
 upstream: released (2.6.12.3)
 2.6.8-sarge-security: released (2.6.8-16sarge1) [netfilter-NAT-memory-corruption.dpatch]
 2.4.27-sarge-security: released (2.4.27-10sarge1) [174_net-ipv4-netfilter-nat-mem.diff]
-2.6.14: 
+linux-2.6: 
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-3276
==============================================================================
--- patch-tracking/CVE-2005-3276	(original)
+++ patch-tracking/CVE-2005-3276	Sun Dec 25 19:52:09 2005
@@ -9,11 +9,9 @@
  to userspace, resulting in a small information leak.
 Bugs: 
 upstream: released (2.6.12.4)
-2.6.13: 
-2.6.12: 
+linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-16sarge1) [sys_get_thread_area-leak.dpatch]
 2.4.27-sarge-security: N/A
-2.6.14: 
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-3358
==============================================================================
--- patch-tracking/CVE-2005-3358	(original)
+++ patch-tracking/CVE-2005-3358	Sun Dec 25 19:52:09 2005
@@ -10,7 +10,7 @@
  jmm> different from CVE-2005-3053.
 Bugs: 
 upstream: released (2.6.11)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.4.19-woody-security: 

Modified: patch-tracking/CVE-2005-3527
==============================================================================
--- patch-tracking/CVE-2005-3527	(original)
+++ patch-tracking/CVE-2005-3527	Sun Dec 25 19:52:09 2005
@@ -27,7 +27,7 @@
 	backporting is too hard for the same reasons as 2.6.8.
 Bugs: 
 upstream: released (2.6.14)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2005-3783
==============================================================================
--- patch-tracking/CVE-2005-3783	(original)
+++ patch-tracking/CVE-2005-3783	Sun Dec 25 19:52:09 2005
@@ -10,7 +10,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.6.14.2)
-2.6.14: released (2.6.14-3)
+linux-2.6: released (2.6.14-3)
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2005-3784
==============================================================================
--- patch-tracking/CVE-2005-3784	(original)
+++ patch-tracking/CVE-2005-3784	Sun Dec 25 19:52:09 2005
@@ -8,7 +8,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2005-3805
==============================================================================
--- patch-tracking/CVE-2005-3805	(original)
+++ patch-tracking/CVE-2005-3805	Sun Dec 25 19:52:09 2005
@@ -8,7 +8,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2005-3806
==============================================================================
--- patch-tracking/CVE-2005-3806	(original)
+++ patch-tracking/CVE-2005-3806	Sun Dec 25 19:52:09 2005
@@ -11,7 +11,7 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: 
+linux-2.6: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.6.8: 

Modified: patch-tracking/CVE-2005-3807
==============================================================================
--- patch-tracking/CVE-2005-3807	(original)
+++ patch-tracking/CVE-2005-3807	Sun Dec 25 19:52:09 2005
@@ -12,7 +12,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.6.14.3) 
-2.6.14: released (2.6.14-4)
+linux-2.6: released (2.6.14-4)
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.4.27: N/A

Modified: patch-tracking/CVE-2005-3808
==============================================================================
--- patch-tracking/CVE-2005-3808	(original)
+++ patch-tracking/CVE-2005-3808	Sun Dec 25 19:52:09 2005
@@ -7,7 +7,7 @@
  I didn't check the woody kernels, but it seems very unlikely it is there
 Bugs: 
 upstream: released (2.6.14.4)
-2.6.14: released (2.6.14-4)
+linux-2.6: released (2.6.14-4)
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.6.8: N/A

Modified: patch-tracking/CVE-2005-3809
==============================================================================
--- patch-tracking/CVE-2005-3809	(original)
+++ patch-tracking/CVE-2005-3809	Sun Dec 25 19:52:09 2005
@@ -4,7 +4,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.6.15-rc1, 2.6.14.3)
-2.6.14: pending (2.6.14-4)
+linux-2.6: pending (2.6.14-4)
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.6.8: N/A

Modified: patch-tracking/CVE-2005-3810
==============================================================================
--- patch-tracking/CVE-2005-3810	(original)
+++ patch-tracking/CVE-2005-3810	Sun Dec 25 19:52:09 2005
@@ -8,7 +8,7 @@
 Notes: 
 Bugs: 
 upstream: released (2.6.15-rc1/2.6.14.3)
-2.6.14: released (2.6.14-4)
+linux-2.6: released (2.6.14-4)
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.6.8: N/A

Modified: patch-tracking/CVE-2005-3847
==============================================================================
--- patch-tracking/CVE-2005-3847	(original)
+++ patch-tracking/CVE-2005-3847	Sun Dec 25 19:52:09 2005
@@ -18,7 +18,7 @@
  dump.
 Bug: 
 upstream: released (2.6.12.6, 2.6.13)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: pending (2.6.8-16sarge2) [nptl-signal-delivery-deadlock-fix.dpatch]
 2.6.8: needed
 2.4.27-sarge-security: N/A

Modified: patch-tracking/CVE-2005-3848
==============================================================================
--- patch-tracking/CVE-2005-3848	(original)
+++ patch-tracking/CVE-2005-3848	Sun Dec 25 19:52:09 2005
@@ -19,13 +19,11 @@
  that cause the ip_append_data function to fail, aka "DST leak in
  icmp_push_reply."
 upstream: released (2.6.12.6, 2.6.13)
-2.6.13: 
-2.6.12: 
 2.6.8-sarge: 
 2.6.8-sarge-security: pending (2.6.8-16sarge2) [fix-dst-leak-in-icmp_push_reply.dpatch]
 2.4.27-sid/sarge: released (2.4.27-12) [188_fix-dst-leak-in-icmp_push_reply.diff]
 2.4.27-sarge-security: pending (2.4.27-10sarge2) [188_fix-dst-leak-in-icmp_push_reply.diff]
-2.6.14: 
+linux-2.6: 
 2.6.8: 
 2.4.19-woody-security: N/A
 2.4.18-woody-security: N/A

Modified: patch-tracking/CVE-2005-3857
==============================================================================
--- patch-tracking/CVE-2005-3857	(original)
+++ patch-tracking/CVE-2005-3857	Sun Dec 25 19:52:09 2005
@@ -12,7 +12,7 @@
  Sent for inclusion in 2.4.33
 Bugs: 
 upstream: released (2.6.15-rc2) needed (2.6.33)
-2.6.14: released (2.6.14+2.6.15-rc5-0experimental.1)
+linux-2.6: released (2.6.14+2.6.15-rc5-0experimental.1)
 2.6.8-sarge-security: pending (2.6.8-16sarge2)
 2.4.27-sarge-security: pending (2.4.27-10sarge2)
 2.4.27: pending (2.4.27-13)

Modified: patch-tracking/CVE-2005-3858
==============================================================================
--- patch-tracking/CVE-2005-3858	(original)
+++ patch-tracking/CVE-2005-3858	Sun Dec 25 19:52:09 2005
@@ -11,7 +11,7 @@
  dannf> 2.4 code could be vulnerable.
 Bugs: 
 upstream: released (2.6.12.6, 2.6.13)
-2.6.14: N/A
+linux-2.6: N/A
 2.6.8-sarge-security: pending (2.6.8-16sarge2)
 2.4.27-sarge-security: pending (2.4.27-10sarge2) [189_ipv6-skb-leak.diff]
 2.4.27-sid: released (2.4.27-12) [189_ipv6-skb-leak.diff]



More information about the Kernel-svn-changes mailing list