r4350 - people/horms/patch_notes

Micah Anderson micah at costa.debian.org
Fri Oct 7 13:04:44 UTC 2005


Author: micah
Date: 2005-10-07 13:04:43 +0000 (Fri, 07 Oct 2005)
New Revision: 4350

Modified:
   people/horms/patch_notes/newcve-2005-09-30
Log:
Updated some more info


Modified: people/horms/patch_notes/newcve-2005-09-30
===================================================================
--- people/horms/patch_notes/newcve-2005-09-30	2005-10-07 10:15:23 UTC (rev 4349)
+++ people/horms/patch_notes/newcve-2005-09-30	2005-10-07 13:04:43 UTC (rev 4350)
@@ -82,8 +82,8 @@
 2.6.12: not vulnerable
 2.6.8-sarge: not vulnerable
 2.6.8-sarge-security: not vulnerable
-2.4.27-sid/sarge: in svn: 184_arch-x86_64-ia32-ptrace32-oops.diff
-2.4.27-sarge-security: in svn: 184_arch-x86_64-ia32-ptrace32-oops.diff
+2.4.27-sid/sarge: in svn: 184_arch-x86_64-ia32-ptrace32-oops.diff (2.4.27-12)
+2.4.27-sarge-security: in svn: 184_arch-x86_64-ia32-ptrace32-oops.diff (2.4.27-10sarge2)
 
 
 
@@ -178,9 +178,9 @@
 2.6.13: not vulnerable
 2.6.12: fixed in 2.6.12-3: linux-2.6.12.5.patch
 2.6.8-sarge: in svn: zisofs.dpatch
-2.6.8-sarge-security: in svn: zisofs.diff
-2.4.27-sid/sarge: in svn: zisofs-2.diff
-2.4.27-sarge-security: in svn: zisofs-2.diff
+2.6.8-sarge-security: in svn: zisofs.diff (2.6.8-16sarge2)
+2.4.27-sid/sarge: in svn: zisofs-2.diff (2.4.27-12)
+2.4.27-sarge-security: in svn: zisofs-2.diff (2.4.27-10sarge2)
 
 
 ======================================================
@@ -371,8 +371,8 @@
 upstream: 2.6.13.1
 2.6.13: fixed in 2.6.13-1: linux-2.6.13.1.patch
 2.6.12: fixed in 2.6.12-7: sendmsg-stackoverflow.patch
-2.6.8-sarge: applied
-2.6.8-sarge-security: applied
+2.6.8-sarge: sendmsg-stackoverflow.patch 
+2.6.8-sarge-security: sendmsg-stackoverflow.patch (2.6.8-16sarge2)
 2.4.27-sid/sarge: not applicable
 2.4.27-sarge-security: not applicable
 
@@ -431,7 +431,7 @@
 2.6.13: fixed in 2.6.13-1: linux-2.6.13.2.patch
 2.6.12: fixed in 2.6.12-7: lost-fput-in-32bit-ioctl-on-x86-64.patch
 2.6.8-sarge: in svn: lost-fput-in-32bit-ioctl-on-x86-64.dpatch
-2.6.8-sarge-security: in svn: lost-fput-in-32bit-ioctl-on-x86-64.dpatch
+2.6.8-sarge-security: in svn: lost-fput-in-32bit-ioctl-on-x86-64.dpatch (2.6.8-16sarge2)
 2.4.27-sid/sarge: code is vulnerable but there is no amd64 for 2.4 in Sarge
 2.4.27-sarge-security: vulnerable but there is no amd64 for 2.4 in Sarge
 
@@ -456,7 +456,7 @@
 upstream: 2.6.12.5
 2.6.12: fixed in 2.6.12-3
 2.6.8-sarge: in svn: mempolicy-check-mode.dpatch
-2.6.8-sarge-security: in svn: mempolicy-check-mode.dpatch
+2.6.8-sarge-security: in svn: mempolicy-check-mode.dpatch (2.6.8-16sarge2)
 2.4.27-sid/sarge: not applicable
 2.4.27-sarge-security: not applicable
 
@@ -516,7 +516,7 @@
 2.6.13: not vulnerable
 2.6.12: not vulnerable
 2.6.8-sarge: in svn: mckinley_icache.dpatch
-2.6.8-sarge-security: fixed in 2.6.8-16sarge1: mckinley_icache.dpatch
+2.6.8-sarge-security: fixed in mckinley_icache.dpatch (2.6.8-16sarge1)
 2.4.27-sid/sarge: vulnerable: #332569
 2.4.27-sarge-security: vulnerable: #332569
 
@@ -547,7 +547,7 @@
 upstream: 2.6.11
 2.6.13: not vulnerable
 2.6.13: not vulnerable
-2.6.8-sarge: in svn: fs-exec-ptrace-core-exec-race.dpatch
+2.6.8-sarge: in svn: fs-exec-ptrace-core-exec-race.dpatch (2.6.8-16sarge1)
 2.6.8-sarge-security: fixed in 2.6.8-16sarge1: fs-exec-ptrace-core-exec-race.dpatch
 2.4.27-sid/sarge: not implemented
 2.4.27-sarge-security: not implemented
@@ -579,7 +579,7 @@
 2.6.13: not vulnerable
 2.6.13: not vulnerable
 2.6.8-sarge: in svn: fs-exec-ptrace-deadlock.dpatch
-2.6.8-sarge-security: fixed in 2.6.8-16sarge1: fs-exec-ptrace-deadlock.dpatch
+2.6.8-sarge-security: fixed in fs-exec-ptrace-deadlock.dpatch (2.6.8-16sarge1)
 2.4.27-sid/sarge: not vulnerable
 2.4.27-sarge-security: not vulnerable
 
@@ -609,7 +609,7 @@
 2.6.13: not vulnerable
 2.6.12: not vulnerable
 2.6.8-sarge: applied to svn: arch-x86_64-mm-ioremap-page-lookup.dpatch
-2.6.8-sarge-security: fixed in 2.6.8-16sarge1: arch-x86_64-mm-ioremap-page-lookup.dpatch
+2.6.8-sarge-security: fixed in arch-x86_64-mm-ioremap-page-lookup.dpatch (2.6.8-16sarge1)
 2.4.27-sid/sarge: not implemented
 2.4.27-sarge-security: not implemented
 
@@ -639,7 +639,7 @@
 2.6.13: not vulnerable
 2.6.12: not vulnerable
 2.6.8-sarge: applied to svn: fs-hfs-oops-and-leak.dpatch
-2.6.8-sarge-security: fixed in 2.6.8-16sarge1: fs-hfs-oops-and-leak.dpatch
+2.6.8-sarge-security: fixed in fs-hfs-oops-and-leak.dpatch (2.6.8-16sarge1)
 2.4.27-sid/sarge: asking upstream: http://lkml.org/lkml/2005/10/7/3/index.html
 2.4.27-sarge-security: asking upstream: http://lkml.org/lkml/2005/10/7/3/index.html
 
@@ -670,7 +670,6 @@
 2.6.13: not vulnerable
 2.6.12: not vulnerable
 2.6.8-sarge: not applicable: net-bridge-netfilter-etables-smp-race.dpatch
-2.6.8-sarge-security: fixed in 2.6.8-16sarge1: net-bridge-netfilter-etables-smp-race.dpatch
+2.6.8-sarge-security: fixed in net-bridge-netfilter-etables-smp-race.dpatch (2.6.8-16sarge1)
 2.4.27-sid/sarge: not applicable
 2.4.27-sarge-security: not applicable
-




More information about the Kernel-svn-changes mailing list