[kernel] r5231 - patch-tracking
Moritz Muehlenhoff
jmm-guest at costa.debian.org
Wed Jan 4 09:58:11 UTC 2006
Author: jmm-guest
Date: Wed Jan 4 09:58:10 2006
New Revision: 5231
Modified:
patch-tracking/CVE-2005-1765
patch-tracking/CVE-2005-2099
patch-tracking/CVE-2005-2456
patch-tracking/CVE-2005-2459
patch-tracking/CVE-2005-2492
patch-tracking/CVE-2005-2553
patch-tracking/CVE-2005-2555
patch-tracking/CVE-2005-2709
patch-tracking/CVE-2005-2800
patch-tracking/CVE-2005-2801
patch-tracking/CVE-2005-2872
patch-tracking/CVE-2005-2973
patch-tracking/CVE-2005-3044
patch-tracking/CVE-2005-3053
patch-tracking/CVE-2005-3180
patch-tracking/CVE-2005-3181
patch-tracking/CVE-2005-3257
patch-tracking/CVE-2005-3271
patch-tracking/CVE-2005-3272
patch-tracking/CVE-2005-3273
patch-tracking/CVE-2005-3274
patch-tracking/CVE-2005-3275
patch-tracking/CVE-2005-3276
patch-tracking/CVE-2005-3847
patch-tracking/CVE-2005-3848
Log:
more 2.6.8/2.6.8-sec consistency fixes
Modified: patch-tracking/CVE-2005-1765
==============================================================================
--- patch-tracking/CVE-2005-1765 (original)
+++ patch-tracking/CVE-2005-1765 Wed Jan 4 09:58:10 2006
@@ -19,5 +19,5 @@
2.4.16-woody-security:
2.4.17-woody-security-hppa:
2.4.17-woody-security-ia64:
-2.6.8:
+2.6.8: N/A
2.4.18-woody-security-hppa:
Modified: patch-tracking/CVE-2005-2099
==============================================================================
--- patch-tracking/CVE-2005-2099 (original)
+++ patch-tracking/CVE-2005-2099 Wed Jan 4 09:58:10 2006
@@ -19,12 +19,11 @@
with a payload that is not empty, which causes the creation to fail,
leading toa null dereference in the keyring destructor.
upstream: released (2.6.12.5)
-2.6.8-sarge: N/A
2.6.8-sarge-security: N/A
2.4.27-sid/sarge: N/A
2.4.27-sarge-security: N/A
linux-2.6: released (2.6.12-3) [linux-2.6.12.5.patch]
-2.6.8:
+2.6.8: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-2456
==============================================================================
--- patch-tracking/CVE-2005-2456 (original)
+++ patch-tracking/CVE-2005-2456 Wed Jan 4 09:58:10 2006
@@ -29,5 +29,5 @@
2.4.16-woody-security:
2.4.17-woody-security-hppa:
2.4.17-woody-security-ia64:
-2.6.8:
+2.6.8: N/A
2.4.18-woody-security-hppa:
Modified: patch-tracking/CVE-2005-2459
==============================================================================
--- patch-tracking/CVE-2005-2459 (original)
+++ patch-tracking/CVE-2005-2459 Wed Jan 4 09:58:10 2006
@@ -22,11 +22,10 @@
jmm> N/A? Thich version is correct?
upstream: released (2.6.12.6)
linux-2.6:
-2.6.8-sarge: N/A
2.6.8-sarge-security: released (2.6.8-16sarge1) [linux-zlib-fixes.dpatch]
2.4.27-sid/sarge: N/A
2.4.27-sarge-security: released (2.4.27-10sarge1) [182_linux-zlib-fixes.diff]
-2.6.8:
+2.6.8: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-2492
==============================================================================
--- patch-tracking/CVE-2005-2492 (original)
+++ patch-tracking/CVE-2005-2492 Wed Jan 4 09:58:10 2006
@@ -23,11 +23,10 @@
state) or read from arbitrary memory via crafted input.
upstream: released (2.6.13.1)
linux-2.6: released (2.6.12-7, 2.6.13-1) [sendmsg-DoS.patch, linux-2.6.13.1.patch]
-2.6.8-sarge: N/A
2.6.8-sarge-security: N/A
2.4.27-sid/sarge: N/A
2.4.27-sarge-security: N/A
-2.6.8:
+2.6.8: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-2553
==============================================================================
--- patch-tracking/CVE-2005-2553 (original)
+++ patch-tracking/CVE-2005-2553 Wed Jan 4 09:58:10 2006
@@ -12,11 +12,10 @@
Bugs:
upstream: released (2.4.29)
linux-2.6: N/A
-2.6.8-sarge: N/A
2.6.8-sarge-security: N/A
2.4.27-sid/sarge: pending [184_arch-x86_64-ia32-ptrace32-oops.diff]
2.4.27-sarge-security: released (2.4.27-10sarge1) [184_arch-x86_64-ia32-ptrace32-oops.diff]
-2.6.8:
+2.6.8: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-2555
==============================================================================
--- patch-tracking/CVE-2005-2555 (original)
+++ patch-tracking/CVE-2005-2555 Wed Jan 4 09:58:10 2006
@@ -12,7 +12,7 @@
linux-2.6: pending
2.6.8-sarge-security: pending (2.6.8-16sarge2)
2.4.27-sarge-security: pending (2.4.27-10sarge2)
-2.6.8:
+2.6.8: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-2709
==============================================================================
--- patch-tracking/CVE-2005-2709 (original)
+++ patch-tracking/CVE-2005-2709 Wed Jan 4 09:58:10 2006
@@ -22,7 +22,7 @@
2.6.8-sarge-security: pending (2.6.8-16sarge2) [sysctl-unregistration-oops.dpatch]
2.4.27-sarge-security: pending (2.4.27-10sarge2) [196_sysctl-unregistration-oops.patch]
2.4.27:
-2.6.8:
+2.6.8: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-2800
==============================================================================
--- patch-tracking/CVE-2005-2800 (original)
+++ patch-tracking/CVE-2005-2800 Wed Jan 4 09:58:10 2006
@@ -14,7 +14,7 @@
linux-2.6:
2.6.8-sarge-security: pending (2.6.8-16sarge2)
2.4.27-sarge-security:
-2.6.8:
+2.6.8: N/A
2.4.19-woody-security: N/A
2.4.18-woody-security: N/A
2.4.17-woody-security: N/A
Modified: patch-tracking/CVE-2005-2801
==============================================================================
--- patch-tracking/CVE-2005-2801 (original)
+++ patch-tracking/CVE-2005-2801 Wed Jan 4 09:58:10 2006
@@ -13,7 +13,7 @@
blocks, which could prevent default ACLs from being applied.
Bugs: 332381
upstream: released (2.6.11)
-2.6.8-sarge-security: released (2.6.8-16-sarge1) [fs_ext2_ext3_xattr-sharing.dpatch]
+2.6.8-sarge-security: released (2.6.8-16sarge1) [fs_ext2_ext3_xattr-sharing.dpatch]
2.4.27-sarge-security: released (2.4.27-10sarge1) [178_fs_ext2_ext3_xattr-sharing.diff]
2.4.27-sid: released (2.4.27-12) [178_fs_ext2_ext3_xattr-sharing.diff]
linux-2.6: N/A
@@ -23,5 +23,5 @@
2.4.16-woody-security:
2.4.17-woody-security-hppa:
2.4.17-woody-security-ia64:
-2.6.8:
+2.6.8: N/A
2.4.18-woody-security-hppa:
Modified: patch-tracking/CVE-2005-2872
==============================================================================
--- patch-tracking/CVE-2005-2872 (original)
+++ patch-tracking/CVE-2005-2872 Wed Jan 4 09:58:10 2006
@@ -29,5 +29,5 @@
2.4.16-woody-security:
2.4.17-woody-security-hppa:
2.4.17-woody-security-ia64:
-2.6.8:
+2.6.8: N/A
2.4.18-woody-security-hppa:
Modified: patch-tracking/CVE-2005-2973
==============================================================================
--- patch-tracking/CVE-2005-2973 (original)
+++ patch-tracking/CVE-2005-2973 Wed Jan 4 09:58:10 2006
@@ -8,13 +8,11 @@
Notes:
submitted for inclusion in 2.4.32-rc2
upstream: released (2.6.14-rc4)
-2.6.13: released (2.6.13+2.6.14-rc4-0experimental.1)
2.6.8-sarge-security: pending (2.6.8-16sarge2) [net-ipv6-udp_v6_get_port-loop.patch]
-2.6.8-sarge: pending (2.6.8-17)
2.4.27-sarge-security: pending (2.4.27-10sarge2) [195_net-ipv6-udp_v6_get_port-loop.diff]
2.4.27-sarge/sid: pending (2.4.27-12)
-linux-2.6:
-2.6.8:
+linux-2.6: released (2.6.13+2.6.14-rc4-0experimental.1)
+2.6.8: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-3044
==============================================================================
--- patch-tracking/CVE-2005-3044 (original)
+++ patch-tracking/CVE-2005-3044 Wed Jan 4 09:58:10 2006
@@ -25,7 +25,7 @@
2.6.8-sarge-security: pending (2.6.8-16sarge2) [lost-fput-in-32bit-ioctl-on-x86-64.dpatch]
2.4.27-sid/sarge: needed
2.4.27-sarge-security: needed
-2.6.8:
+2.6.8: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-3053
==============================================================================
--- patch-tracking/CVE-2005-3053 (original)
+++ patch-tracking/CVE-2005-3053 Wed Jan 4 09:58:10 2006
@@ -20,7 +20,7 @@
2.6.8-sarge-security: pending (2.6.8-16sarge2) [mempolicy-check-mode.dpatch]
2.4.27-sid/sarge: N/A
2.4.27-sarge-security: N/A
-2.6.8:
+2.6.8: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-3180
==============================================================================
--- patch-tracking/CVE-2005-3180 (original)
+++ patch-tracking/CVE-2005-3180 Wed Jan 4 09:58:10 2006
@@ -19,7 +19,7 @@
2.6.8-sarge-security: pending (2.6.8-16sarge2) [orinoco-info-leak.dpatch]
2.4.27-sid/sarge: released (2.4.27-12) [192_orinoco-info-leak.diff]
2.4.27-sarge-security: pending [192_orinoco-info-leak.diff]
-2.6.8:
+2.6.8: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-3181
==============================================================================
--- patch-tracking/CVE-2005-3181 (original)
+++ patch-tracking/CVE-2005-3181 Wed Jan 4 09:58:10 2006
@@ -11,13 +11,12 @@
2.4 isn't vulnerable because AUDITSYSCALL doesn't exist in 2.4
Bugs:
upstream: released (2.6.13.4)
-2.6.13: released (2.6.13+2.6.14-rc4-0experimental.1)
2.6.8-sarge-security: pending (2.6.8-16sarge2)
2.6.8-sarge: pending (2.6.8-17)
2.4.27-sarge-security: N/A
2.4.27-sarge/sid: N/A
-linux-2.6:
-2.6.8:
+linux-2.6: released (2.6.13+2.6.14-rc4-0experimental.1)
+2.6.8: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-3257
==============================================================================
--- patch-tracking/CVE-2005-3257 (original)
+++ patch-tracking/CVE-2005-3257 Wed Jan 4 09:58:10 2006
@@ -14,11 +14,10 @@
jmm> sorted out.
upstream: released (2.4.32-rc3), released (2.6.15-rc1), pending (2.6.14.4)
2.6.8-sarge-security: pending (2.6.8-16sarge2) [setkeys-needs-root-1.dpatch, setkeys-needs-root-2.dpatch]
-2.6.8-sarge:
2.4.27-sarge-security: pending (2.4.27-10sarge2) [197_setkeys-needs-root-1.diff, 197_setkeys-needs-root-2.diff]
2.4.27-sarge/sid:
linux-2.6: pending (2.6.14-4) [setkeys-needs-root-1.patch, setkeys-needs-root-2.patch]
-2.6.8: needed
+2.6.8: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-3271
==============================================================================
--- patch-tracking/CVE-2005-3271 (original)
+++ patch-tracking/CVE-2005-3271 Wed Jan 4 09:58:10 2006
@@ -21,5 +21,5 @@
2.4.16-woody-security:
2.4.17-woody-security-hppa:
2.4.17-woody-security-ia64:
-2.6.8:
+2.6.8: N/A
2.4.18-woody-security-hppa:
Modified: patch-tracking/CVE-2005-3272
==============================================================================
--- patch-tracking/CVE-2005-3272 (original)
+++ patch-tracking/CVE-2005-3272 Wed Jan 4 09:58:10 2006
@@ -17,5 +17,5 @@
2.4.16-woody-security:
2.4.17-woody-security-hppa:
2.4.17-woody-security-ia64:
-2.6.8:
+2.6.8: N/A
2.4.18-woody-security-hppa:
Modified: patch-tracking/CVE-2005-3273
==============================================================================
--- patch-tracking/CVE-2005-3273 (original)
+++ patch-tracking/CVE-2005-3273 Wed Jan 4 09:58:10 2006
@@ -19,5 +19,5 @@
2.4.16-woody-security:
2.4.17-woody-security-hppa:
2.4.17-woody-security-ia64:
-2.6.8:
+2.6.8: N/A
2.4.18-woody-security-hppa:
Modified: patch-tracking/CVE-2005-3274
==============================================================================
--- patch-tracking/CVE-2005-3274 (original)
+++ patch-tracking/CVE-2005-3274 Wed Jan 4 09:58:10 2006
@@ -15,7 +15,7 @@
linux-2.6: released (2.6.13-1)
2.6.8-sarge-security: released (2.6.8-16sarge1) [net-ipv4-ipvs-conn_tab-race.dpatch]
2.4.27-sarge-security: pending (2.4.27-10sarge1)
-2.6.8:
+2.6.8: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-3275
==============================================================================
--- patch-tracking/CVE-2005-3275 (original)
+++ patch-tracking/CVE-2005-3275 Wed Jan 4 09:58:10 2006
@@ -14,7 +14,7 @@
2.6.8-sarge-security: released (2.6.8-16sarge1) [netfilter-NAT-memory-corruption.dpatch]
2.4.27-sarge-security: released (2.4.27-10sarge1) [174_net-ipv4-netfilter-nat-mem.diff]
linux-2.6:
-2.6.8:
+2.6.8: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-3276
==============================================================================
--- patch-tracking/CVE-2005-3276 (original)
+++ patch-tracking/CVE-2005-3276 Wed Jan 4 09:58:10 2006
@@ -12,7 +12,7 @@
linux-2.6:
2.6.8-sarge-security: released (2.6.8-16sarge1) [sys_get_thread_area-leak.dpatch]
2.4.27-sarge-security: N/A
-2.6.8:
+2.6.8: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-3847
==============================================================================
--- patch-tracking/CVE-2005-3847 (original)
+++ patch-tracking/CVE-2005-3847 Wed Jan 4 09:58:10 2006
@@ -20,9 +20,8 @@
upstream: released (2.6.12.6, 2.6.13)
linux-2.6: N/A
2.6.8-sarge-security: pending (2.6.8-16sarge2) [nptl-signal-delivery-deadlock-fix.dpatch]
-2.6.8: needed
+2.6.8: N/A
2.4.27-sarge-security: N/A
-2.4.27: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2005-3848
==============================================================================
--- patch-tracking/CVE-2005-3848 (original)
+++ patch-tracking/CVE-2005-3848 Wed Jan 4 09:58:10 2006
@@ -19,12 +19,11 @@
that cause the ip_append_data function to fail, aka "DST leak in
icmp_push_reply."
upstream: released (2.6.12.6, 2.6.13)
-2.6.8-sarge:
2.6.8-sarge-security: pending (2.6.8-16sarge2) [fix-dst-leak-in-icmp_push_reply.dpatch]
2.4.27-sid/sarge: released (2.4.27-12) [188_fix-dst-leak-in-icmp_push_reply.diff]
2.4.27-sarge-security: pending (2.4.27-10sarge2) [188_fix-dst-leak-in-icmp_push_reply.diff]
linux-2.6:
-2.6.8:
+2.6.8: N/A
2.4.19-woody-security: N/A
2.4.18-woody-security: N/A
2.4.17-woody-security: N/A
More information about the Kernel-svn-changes
mailing list