r4442 - dists/sarge/kernel/source/kernel-source-2.6.8-2.6.8/debian dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian people/horms/patch_notes/cve

Simon Horman horms at costa.debian.org
Thu Oct 13 12:34:17 UTC 2005


Author: horms
Date: 2005-10-13 12:34:15 +0000 (Thu, 13 Oct 2005)
New Revision: 4442

Modified:
   dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog
   dists/sarge/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog
   people/horms/patch_notes/cve/CAN-2005-3105
   people/horms/patch_notes/cve/CAN-2005-3110
Log:
Fixed annotations for CAN-2005-3110 CAN-2005-3109 CAN-2005-3107 CAN-2005-3106

Modified: dists/sarge/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog
===================================================================
--- dists/sarge/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog	2005-10-13 12:32:48 UTC (rev 4441)
+++ dists/sarge/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog	2005-10-13 12:34:15 UTC (rev 4442)
@@ -58,7 +58,7 @@
     [SECURITY] Fix a leak in HFS and HFS+
     Fix an oops that occurs when an attempt is made to
     mount a non-hfs filesystem as HFS+.
-    See CAN-2005-3110
+    See CAN-2005-3109
 
   * fs-jbd-checkpoint-assertion.dpatch
     Fix possible false assertion failure in log_do_checkpoint(). We might fail
@@ -76,6 +76,7 @@
   * net-bridge-netfilter-etables-smp-race.dpatch
     [SECURITY] The patch below fixes an smp race that happens on such
     systems under heavy load.
+    See CAN-2005-3110
 
   * net-bridge-mangle-oops-1.dpatch, net-bridge-mangle-oops-2.dpatch
     Fix oops when mangling and brouting and tcpdumping packets

Modified: dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog
===================================================================
--- dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog	2005-10-13 12:32:48 UTC (rev 4441)
+++ dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog	2005-10-13 12:34:15 UTC (rev 4442)
@@ -60,17 +60,20 @@
     [SECURITY] lost sockfd_put() in routing_ioctl(); local DoS
     From 2.6.13.2
 
-  * fs-hfs-oops-and-leak.dpatch
+  * net-bridge-netfilter-etables-smp-race.dpatch
     in 2.6.8-16sarge1 is CAN-2005-3110
 
+  * fs-hfs-oops-and-leak.dpatch
+    in 2.6.8-16sarge1 is CAN-2005-3109
+
   * arch-x86_64-mm-ioremap-page-lookup.dpatch
     in 2.6.8-16sarge1 is CAN-2005-3108
 
   * fs-exec-ptrace-core-exec-race.dpatch
-    in 2.6.8-16sarge1 is CAN-2005-3107
+    in 2.6.8-16sarge1 is CAN-2005-3106
 
   * fs-exec-ptrace-deadlock.dpatch
-    in 2.6.8-16sarge1 is CAN-2005-3106
+    in 2.6.8-16sarge1 is CAN-2005-3107
 
   * mckinley_icache.dpatch
     in 2.6.8-16sarge1 is CAN-2005-3105

Modified: people/horms/patch_notes/cve/CAN-2005-3105
===================================================================
--- people/horms/patch_notes/cve/CAN-2005-3105	2005-10-13 12:32:48 UTC (rev 4441)
+++ people/horms/patch_notes/cve/CAN-2005-3105	2005-10-13 12:34:15 UTC (rev 4442)
@@ -22,7 +22,7 @@
 http://linux.bkbits.net:8080/linux-2.6/cset@4248d4019z8HvgrPAji51TKrWiV2uw?nav=index.html|src/|src/mm|related/mm/mprotect.c
 
 Notes from Micah and Horms:
-upstream: fixed
+upstream: 2.6.12
 2.6.13: not vulnerable
 2.6.12: not vulnerable
 2.6.8-sarge: in svn: mckinley_icache.dpatch

Modified: people/horms/patch_notes/cve/CAN-2005-3110
===================================================================
--- people/horms/patch_notes/cve/CAN-2005-3110	2005-10-13 12:32:48 UTC (rev 4441)
+++ people/horms/patch_notes/cve/CAN-2005-3110	2005-10-13 12:34:15 UTC (rev 4442)
@@ -24,7 +24,7 @@
 upstream: 2.6.11.11
 2.6.13: not vulnerable
 2.6.12: not vulnerable
-2.6.8-sarge: not applicable: net-bridge-netfilter-etables-smp-race.dpatch
+2.6.8-sarge: added to svn: net-bridge-netfilter-etables-smp-race.dpatch
 2.6.8-sarge-security: fixed in 2.6.8-16sarge1: net-bridge-netfilter-etables-smp-race.dpatch
 2.4.27-sid/sarge: not applicable
 2.4.27-sarge-security: not applicable




More information about the Kernel-svn-changes mailing list