r4408 - people/horms/patch_notes/2.6-stable

Simon Horman horms at costa.debian.org
Tue Oct 11 10:36:26 UTC 2005


Author: horms
Date: 2005-10-11 10:36:25 +0000 (Tue, 11 Oct 2005)
New Revision: 4408

Modified:
   people/horms/patch_notes/2.6-stable/2.6.13.4
Log:
2.6.13.4 annotations

Modified: people/horms/patch_notes/2.6-stable/2.6.13.4
===================================================================
--- people/horms/patch_notes/2.6-stable/2.6.13.4	2005-10-11 10:36:18 UTC (rev 4407)
+++ people/horms/patch_notes/2.6-stable/2.6.13.4	2005-10-11 10:36:25 UTC (rev 4408)
@@ -6,65 +6,71 @@
 
    Security: No
    2.6.13: applied
-   2.6.12: pending examination
-   2.6.8-sarge: will add to svn; ieee1394-sbp2-fixes-for-hot-unplug-and-module-unloading.dpatch
+   2.6.12: added to svn; ieee1394-sbp2-fixes-for-hot-unplug-and-module-unloading.patch
+   2.6.8-sarge: added to svn; ieee1394-sbp2-fixes-for-hot-unplug-and-module-unloading.dpatch
    2.6.8-sarge-security: not a security fix
-   2.4.27-sid/sarge: not applicable 
-   2.4.27-sarge-security:  not applicable; not a security fix
+   2.4.27-sid/sarge: not vulnerable 
+   2.4.27-sarge-security:  not vulnerable; not a security fix
 
- * orinoco: Information leakage due to incorrect padding
+ * [SECURITY] orinoco: Information leakage due to incorrect padding
    orinoco-info-leak.patch
 
-   Security: Yes
+   Security: Yes; Should request CVE
    2.6.13: applied
-   2.6.12: pending examination
-   2.6.8-sarge: will add to svn; backported; orinoco-info-leak.dpatch
-   2.6.8-sarge-security: will add to svn; backported; orinoco-info-leak.dpatch
-   2.4.27-sid/sarge: will add to svn; backported; orinoco-info-leak.diff
-   2.4.27-sarge-security: will add to svn; backported; orinoco-info-leak.diff
+   2.6.12: added to svn; orinoco-info-leak.patch
+   2.6.8-sarge: added to svn; backported; orinoco-info-leak.dpatch
+   2.6.8-sarge-security: added to svn; backported; orinoco-info-leak.dpatch
+   2.4.27-sid/sarge: added to svn; backported; 192_orinoco-info-leak.diff
+   2.4.27-sarge-security: added to svn; backported; 192_orinoco-info-leak.diff
 
  * [TCP]: BIC coding bug in Linux 2.6.13
    tcp-congestion-control-bug.patch
 
    Security: pending examination: 
    2.6.13: applied
-   2.6.12: pending examination
-   2.6.8-sarge: pending examination
-   2.6.8-sarge-security: pending examination
-   2.4.27-sid/sarge: pending examination
-   2.4.27-sarge-security: pending examination
+   2.6.12: not vulnerable
+   2.6.8-sarge: not vulnerable
+   2.6.8-sarge-security: not vulnerable; not a security fix
+   2.4.27-sid/sarge: not vulnerable
+   2.4.27-sarge-security: not vulnerable; not a security fix
 
- * Fix drm 'debug' sysfs permissions
+ * [SECURITY] Fix drm 'debug' sysfs permissions
    drm-module_param-permissions-fix.patch
 
-   Security: Yes
+   Security: Yes; Should request CVE
    2.6.13: applied
-   2.6.12: pending examination
-   2.6.8-sarge: pending examination
-   2.6.8-sarge-security: pending examination
-   2.4.27-sid/sarge: pending examination
-   2.4.27-sarge-security: pending examination
+   2.6.12: added to svn; drm-module_param-permissions-fix.patch
+   2.6.8-sarge: not vulnerable
+   2.6.8-sarge-security: not vulnerable
+   2.4.27-sid/sarge: not vulnerable
+   2.4.27-sarge-security: not vulnerable
 
  * [SPARC64]: Fix userland FPU state corruption.
    fix-sparc64-fpu-register-corruption.patch
 
-   Security: pending examination: 
+   Security: No
    2.6.13: applied
-   2.6.12: pending examination
-   2.6.8-sarge: pending examination
-   2.6.8-sarge-security: pending examination
-   2.4.27-sid/sarge: pending examination
-   2.4.27-sarge-security: pending examination
+   2.6.12: added to svn; backport; fix-sparc64-fpu-register-corruption.patch
+   2.6.8-sarge: added to svn; backport; fix-sparc64-fpu-register-corruption.dpatch
+   2.6.8-sarge-security: not a security fix
+   2.4.27-sid/sarge: not vulnerable
+   2.4.27-sarge-security: not vulnerable
 
+   N.B: Could someone please look at these backports.
+        They were trivial enough, but I have no way of testing them,
+	nor do I have a good grasp of sparc assembly.
+	I know this bug was painful to find, so presumably
+	a miss-fix would be simmilarly painful. -- Horms
+
  * Avoid 'names_cache' memory leak with CONFIG_AUDITSYSCALL
    plug-names_cache-memleak.patch
 
-   Security: pending examination: 
+   Security: No
    2.6.13: applied
-   2.6.12: pending examination
-   2.6.8-sarge: pending examination
-   2.6.8-sarge-security: pending examination
-   2.4.27-sid/sarge: pending examination
+   2.6.12: added to svn; backport; plug-names_cache-memleak.dpatch
+   2.6.8-sarge: added to svn; backport; plug-names_cache-memleak.dpatch
+   2.6.8-sarge-security: not a security fix
+   2.4.27-sid/sarge: added to svn; backport; 193_plug-names_cache-memleak.diff
    2.4.27-sarge-security: pending examination
 
  * [SECURITY] key: plug request_key_auth memleak
@@ -73,9 +79,9 @@
 
    Security: Yes; CAN-2005-3119
    2.6.13: applied
-   2.6.12: pending examination
-   2.6.8-sarge: pending examination
-   2.6.8-sarge-security: pending examination
-   2.4.27-sid/sarge: pending examination
-   2.4.27-sarge-security: pending examination
+   2.6.12: not vulnerable
+   2.6.8-sarge: not vulnerable
+   2.6.8-sarge-security: not vulnerable
+   2.4.27-sid/sarge: not vulnerable
+   2.4.27-sarge-security: not vulnerable
 




More information about the Kernel-svn-changes mailing list