[kernel] r4777 - people/dannf/patchinfo

Dann Frazier dannf at costa.debian.org
Thu Nov 10 07:31:44 UTC 2005


Author: dannf
Date: Thu Nov 10 07:31:42 2005
New Revision: 4777

Added:
   people/dannf/patchinfo/CAN-2005-2555
      - copied, changed from r4774, people/dannf/patchinfo/00boilerplate
Modified:
   people/dannf/patchinfo/00boilerplate
   people/dannf/patchinfo/CAN-2005-2457
   people/dannf/patchinfo/CAN-2005-2459
   people/dannf/patchinfo/fix-dst-leak-in-icmp_push_reply
   people/dannf/patchinfo/nptl-signal-delivery-deadlock-fix
Log:
various updates

Modified: people/dannf/patchinfo/00boilerplate
==============================================================================
--- people/dannf/patchinfo/00boilerplate	(original)
+++ people/dannf/patchinfo/00boilerplate	Thu Nov 10 07:31:42 2005
@@ -4,9 +4,9 @@
 Notes: 
 Bugs: 
 upstream: 
-2.6.14: pending
-2.6.8-sarge-security: released (2.6.8-16sarge1) [patchname.patch, prerequisite.dpatch, prerequisite2.dpatch]
-2.4.27-sarge-security: needed
+2.6.14: 
+2.6.8-sarge-security: 
+2.4.27-sarge-security: 
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: people/dannf/patchinfo/CAN-2005-2457
==============================================================================
--- people/dannf/patchinfo/CAN-2005-2457	(original)
+++ people/dannf/patchinfo/CAN-2005-2457	Thu Nov 10 07:31:42 2005
@@ -1,12 +1,6 @@
 Candidate: CAN-2005-2457
 References: 
- URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2457
- Final-Decision:
- Interim-Decision:
- Modified:
- Proposed:
- Assigned: 20050804
- Category: SF
+ URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2457
  CONFIRM:http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5
  UBUNTU:USN-169-1
  URL:http://www.ubuntulinux.org/support/documentation/usn/usn-169-1
@@ -23,9 +17,9 @@
 2.6.13: N/A
 2.6.12: released (2.6.12-3) [linux-2.6.12.5.patch]
 2.6.8-sarge: pending [zisofs.dpatch]
-2.6.8-sarge-security: pending [zisofs.diff]
+2.6.8-sarge-security: pending (2.6.8-16sarge2) [zisofs.diff]
 2.4.27-sid/sarge: pending [187_zisofs-2.diff]
-2.4.27-sarge-security: pending [187_zisofs-2.diff]
+2.4.27-sarge-security: pending (2.4.27-10sarge2) [187_zisofs-2.diff]
 2.6.14: 
 2.6.8: 
 2.4.19-woody-security: 

Modified: people/dannf/patchinfo/CAN-2005-2459
==============================================================================
--- people/dannf/patchinfo/CAN-2005-2459	(original)
+++ people/dannf/patchinfo/CAN-2005-2459	Thu Nov 10 07:31:42 2005
@@ -1,12 +1,6 @@
 Candidate: CAN-2005-2459
 References: 
  URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2459
- Final-Decision:
- Interim-Decision:
- Modified:
- Proposed:
- Assigned: 20050805
- Category: SF
  MISC:http://bugs.gentoo.org/show_bug.cgi?id=94584
  CONFIRM:http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5
  UBUNTU:USN-169-1
@@ -22,13 +16,14 @@
 Notes: 
  This is a bogus fix that was applied in 2.6.12.5 and reverted in 2.6.12.6
  http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.6
+ We included the broken fix in the sarge1 releases, so this backs it out.
 upstream: released (2.6.12.6)
 2.6.13: N/A
 2.6.12: N/A
 2.6.8-sarge: N/A
-2.6.8-sarge-security: N/A
+2.6.8-sarge-security: pending (2.6.8-16sarge2)
 2.4.27-sid/sarge: N/A
-2.4.27-sarge-security: N/A
+2.4.27-sarge-security: ending (2.6.8-16sarge2)
 2.6.14: 
 2.6.8: 
 2.4.19-woody-security: 

Copied: people/dannf/patchinfo/CAN-2005-2555 (from r4774, people/dannf/patchinfo/00boilerplate)
==============================================================================
--- people/dannf/patchinfo/00boilerplate	(original)
+++ people/dannf/patchinfo/CAN-2005-2555	Thu Nov 10 07:31:42 2005
@@ -1,12 +1,17 @@
-Candidate: 
+Candidate: CAN-2005-2555
 References: 
+ URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2555
 Description: 
+ Linux kernel 2.6.x does not properly restrict socket policy access to users
+ with the CAP_NET_ADMIN capability, which could allow local users to conduct
+ unauthorized activities via (1) ipv4/ip_sockglue.c and
+ (2) ipv6/ipv6_sockglue.c.
 Notes: 
 Bugs: 
-upstream: 
+upstream: released (2.6.13)
 2.6.14: pending
-2.6.8-sarge-security: released (2.6.8-16sarge1) [patchname.patch, prerequisite.dpatch, prerequisite2.dpatch]
-2.4.27-sarge-security: needed
+2.6.8-sarge-security: pending (2.6.8-16sarge2)
+2.4.27-sarge-security: pending (2.4.27-10sarge2)
 2.6.8: 
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: people/dannf/patchinfo/fix-dst-leak-in-icmp_push_reply
==============================================================================
--- people/dannf/patchinfo/fix-dst-leak-in-icmp_push_reply	(original)
+++ people/dannf/patchinfo/fix-dst-leak-in-icmp_push_reply	Thu Nov 10 07:31:42 2005
@@ -1,20 +1,29 @@
 Candidate: ##NEEDED##
 References: 
- URL:
- CONFIRM:http://lkml.org/lkml/2005/8/26/173
+ CONFIRM:http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=cb94c62c252796f42bb83fe40960d12f3ea5a82a
+ MISC:http://lkml.org/lkml/2005/8/26/173
 Description: 
-upstream: released (2.6.12.6)
+ Ollie Wild discovered a leak in the icmp_push_reply() function in Linux 2.6,
+ in which an ignored error returned by ip_append_data() would result in the
+ route and net_device not being freed.  A malicious remote user could exploit
+ this in order to initiate a denial of service attack.  This issue was fixed
+ in Linux 2.6.12.6 and 2.6.13.
+Notes:
+ This code looks completely different in 2.4; neither ip_append_data() (the
+ function that returns an error) nor icmp_push_reply() (the function that fails
+ to check this error) exist.  So, I'm marking 2.4 as unaffected.
+upstream: released (2.6.12.6, 2.6.13)
 2.6.13: 
 2.6.12: 
 2.6.8-sarge: 
 2.6.8-sarge-security: pending [fix-dst-leak-in-icmp_push_reply.dpatch]
-2.4.27-sid/sarge: 
-2.4.27-sarge-security: 
+2.4.27-sid/sarge: N/A
+2.4.27-sarge-security: N/A
 2.6.14: 
 2.6.8: 
-2.4.19-woody-security: 
-2.4.18-woody-security: 
-2.4.17-woody-security: 
-2.4.16-woody-security: 
-2.4.17-woody-security-hppa: 
-2.4.17-woody-security-ia64: 
+2.4.19-woody-security: N/A
+2.4.18-woody-security: N/A
+2.4.17-woody-security: N/A
+2.4.16-woody-security: N/A
+2.4.17-woody-security-hppa: N/A
+2.4.17-woody-security-ia64: N/A

Modified: people/dannf/patchinfo/nptl-signal-delivery-deadlock-fix
==============================================================================
--- people/dannf/patchinfo/nptl-signal-delivery-deadlock-fix	(original)
+++ people/dannf/patchinfo/nptl-signal-delivery-deadlock-fix	Thu Nov 10 07:31:42 2005
@@ -2,6 +2,7 @@
 References:
  CONFIRM:http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=dd12f48d4e8774415b528d3991ae47c28f26e1ac;hp=ade6648b3b11a5d81f6f28135193ab6d85d621db
  MISC:http://groups.google.com/group/linux.kernel/browse_thread/thread/74683bcc8dbf0df3/bf540370894d3de0%23bf540370894d3de0?sa=X&oi=groupsr&start=0&num=3
+ MISC:http://svn.debian.org/wsvn/kernel/dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/patches/nptl-signal-delivery-deadlock-fix.dpatch?op=file&rev=4458&sc=0
 Description:
  Bhavesh P. Davda reported a race condition that exists in Linux 2.6 kernels prior to
  2.6.13 and 2.6.12.6.  A deadlock can occur when a SIGKILL signal is sent to a real-time



More information about the Kernel-svn-changes mailing list