r4350 - people/horms/patch_notes
Micah Anderson
micah at costa.debian.org
Fri Oct 7 13:04:44 UTC 2005
Author: micah
Date: 2005-10-07 13:04:43 +0000 (Fri, 07 Oct 2005)
New Revision: 4350
Modified:
people/horms/patch_notes/newcve-2005-09-30
Log:
Updated some more info
Modified: people/horms/patch_notes/newcve-2005-09-30
===================================================================
--- people/horms/patch_notes/newcve-2005-09-30 2005-10-07 10:15:23 UTC (rev 4349)
+++ people/horms/patch_notes/newcve-2005-09-30 2005-10-07 13:04:43 UTC (rev 4350)
@@ -82,8 +82,8 @@
2.6.12: not vulnerable
2.6.8-sarge: not vulnerable
2.6.8-sarge-security: not vulnerable
-2.4.27-sid/sarge: in svn: 184_arch-x86_64-ia32-ptrace32-oops.diff
-2.4.27-sarge-security: in svn: 184_arch-x86_64-ia32-ptrace32-oops.diff
+2.4.27-sid/sarge: in svn: 184_arch-x86_64-ia32-ptrace32-oops.diff (2.4.27-12)
+2.4.27-sarge-security: in svn: 184_arch-x86_64-ia32-ptrace32-oops.diff (2.4.27-10sarge2)
@@ -178,9 +178,9 @@
2.6.13: not vulnerable
2.6.12: fixed in 2.6.12-3: linux-2.6.12.5.patch
2.6.8-sarge: in svn: zisofs.dpatch
-2.6.8-sarge-security: in svn: zisofs.diff
-2.4.27-sid/sarge: in svn: zisofs-2.diff
-2.4.27-sarge-security: in svn: zisofs-2.diff
+2.6.8-sarge-security: in svn: zisofs.diff (2.6.8-16sarge2)
+2.4.27-sid/sarge: in svn: zisofs-2.diff (2.4.27-12)
+2.4.27-sarge-security: in svn: zisofs-2.diff (2.4.27-10sarge2)
======================================================
@@ -371,8 +371,8 @@
upstream: 2.6.13.1
2.6.13: fixed in 2.6.13-1: linux-2.6.13.1.patch
2.6.12: fixed in 2.6.12-7: sendmsg-stackoverflow.patch
-2.6.8-sarge: applied
-2.6.8-sarge-security: applied
+2.6.8-sarge: sendmsg-stackoverflow.patch
+2.6.8-sarge-security: sendmsg-stackoverflow.patch (2.6.8-16sarge2)
2.4.27-sid/sarge: not applicable
2.4.27-sarge-security: not applicable
@@ -431,7 +431,7 @@
2.6.13: fixed in 2.6.13-1: linux-2.6.13.2.patch
2.6.12: fixed in 2.6.12-7: lost-fput-in-32bit-ioctl-on-x86-64.patch
2.6.8-sarge: in svn: lost-fput-in-32bit-ioctl-on-x86-64.dpatch
-2.6.8-sarge-security: in svn: lost-fput-in-32bit-ioctl-on-x86-64.dpatch
+2.6.8-sarge-security: in svn: lost-fput-in-32bit-ioctl-on-x86-64.dpatch (2.6.8-16sarge2)
2.4.27-sid/sarge: code is vulnerable but there is no amd64 for 2.4 in Sarge
2.4.27-sarge-security: vulnerable but there is no amd64 for 2.4 in Sarge
@@ -456,7 +456,7 @@
upstream: 2.6.12.5
2.6.12: fixed in 2.6.12-3
2.6.8-sarge: in svn: mempolicy-check-mode.dpatch
-2.6.8-sarge-security: in svn: mempolicy-check-mode.dpatch
+2.6.8-sarge-security: in svn: mempolicy-check-mode.dpatch (2.6.8-16sarge2)
2.4.27-sid/sarge: not applicable
2.4.27-sarge-security: not applicable
@@ -516,7 +516,7 @@
2.6.13: not vulnerable
2.6.12: not vulnerable
2.6.8-sarge: in svn: mckinley_icache.dpatch
-2.6.8-sarge-security: fixed in 2.6.8-16sarge1: mckinley_icache.dpatch
+2.6.8-sarge-security: fixed in mckinley_icache.dpatch (2.6.8-16sarge1)
2.4.27-sid/sarge: vulnerable: #332569
2.4.27-sarge-security: vulnerable: #332569
@@ -547,7 +547,7 @@
upstream: 2.6.11
2.6.13: not vulnerable
2.6.13: not vulnerable
-2.6.8-sarge: in svn: fs-exec-ptrace-core-exec-race.dpatch
+2.6.8-sarge: in svn: fs-exec-ptrace-core-exec-race.dpatch (2.6.8-16sarge1)
2.6.8-sarge-security: fixed in 2.6.8-16sarge1: fs-exec-ptrace-core-exec-race.dpatch
2.4.27-sid/sarge: not implemented
2.4.27-sarge-security: not implemented
@@ -579,7 +579,7 @@
2.6.13: not vulnerable
2.6.13: not vulnerable
2.6.8-sarge: in svn: fs-exec-ptrace-deadlock.dpatch
-2.6.8-sarge-security: fixed in 2.6.8-16sarge1: fs-exec-ptrace-deadlock.dpatch
+2.6.8-sarge-security: fixed in fs-exec-ptrace-deadlock.dpatch (2.6.8-16sarge1)
2.4.27-sid/sarge: not vulnerable
2.4.27-sarge-security: not vulnerable
@@ -609,7 +609,7 @@
2.6.13: not vulnerable
2.6.12: not vulnerable
2.6.8-sarge: applied to svn: arch-x86_64-mm-ioremap-page-lookup.dpatch
-2.6.8-sarge-security: fixed in 2.6.8-16sarge1: arch-x86_64-mm-ioremap-page-lookup.dpatch
+2.6.8-sarge-security: fixed in arch-x86_64-mm-ioremap-page-lookup.dpatch (2.6.8-16sarge1)
2.4.27-sid/sarge: not implemented
2.4.27-sarge-security: not implemented
@@ -639,7 +639,7 @@
2.6.13: not vulnerable
2.6.12: not vulnerable
2.6.8-sarge: applied to svn: fs-hfs-oops-and-leak.dpatch
-2.6.8-sarge-security: fixed in 2.6.8-16sarge1: fs-hfs-oops-and-leak.dpatch
+2.6.8-sarge-security: fixed in fs-hfs-oops-and-leak.dpatch (2.6.8-16sarge1)
2.4.27-sid/sarge: asking upstream: http://lkml.org/lkml/2005/10/7/3/index.html
2.4.27-sarge-security: asking upstream: http://lkml.org/lkml/2005/10/7/3/index.html
@@ -670,7 +670,6 @@
2.6.13: not vulnerable
2.6.12: not vulnerable
2.6.8-sarge: not applicable: net-bridge-netfilter-etables-smp-race.dpatch
-2.6.8-sarge-security: fixed in 2.6.8-16sarge1: net-bridge-netfilter-etables-smp-race.dpatch
+2.6.8-sarge-security: fixed in net-bridge-netfilter-etables-smp-race.dpatch (2.6.8-16sarge1)
2.4.27-sid/sarge: not applicable
2.4.27-sarge-security: not applicable
-
More information about the Kernel-svn-changes
mailing list