[kernel] r5231 - patch-tracking

Moritz Muehlenhoff jmm-guest at costa.debian.org
Wed Jan 4 09:58:11 UTC 2006


Author: jmm-guest
Date: Wed Jan  4 09:58:10 2006
New Revision: 5231

Modified:
   patch-tracking/CVE-2005-1765
   patch-tracking/CVE-2005-2099
   patch-tracking/CVE-2005-2456
   patch-tracking/CVE-2005-2459
   patch-tracking/CVE-2005-2492
   patch-tracking/CVE-2005-2553
   patch-tracking/CVE-2005-2555
   patch-tracking/CVE-2005-2709
   patch-tracking/CVE-2005-2800
   patch-tracking/CVE-2005-2801
   patch-tracking/CVE-2005-2872
   patch-tracking/CVE-2005-2973
   patch-tracking/CVE-2005-3044
   patch-tracking/CVE-2005-3053
   patch-tracking/CVE-2005-3180
   patch-tracking/CVE-2005-3181
   patch-tracking/CVE-2005-3257
   patch-tracking/CVE-2005-3271
   patch-tracking/CVE-2005-3272
   patch-tracking/CVE-2005-3273
   patch-tracking/CVE-2005-3274
   patch-tracking/CVE-2005-3275
   patch-tracking/CVE-2005-3276
   patch-tracking/CVE-2005-3847
   patch-tracking/CVE-2005-3848
Log:
more 2.6.8/2.6.8-sec consistency fixes


Modified: patch-tracking/CVE-2005-1765
==============================================================================
--- patch-tracking/CVE-2005-1765	(original)
+++ patch-tracking/CVE-2005-1765	Wed Jan  4 09:58:10 2006
@@ -19,5 +19,5 @@
 2.4.16-woody-security: 
 2.4.17-woody-security-hppa: 
 2.4.17-woody-security-ia64: 
-2.6.8: 
+2.6.8: N/A
 2.4.18-woody-security-hppa: 

Modified: patch-tracking/CVE-2005-2099
==============================================================================
--- patch-tracking/CVE-2005-2099	(original)
+++ patch-tracking/CVE-2005-2099	Wed Jan  4 09:58:10 2006
@@ -19,12 +19,11 @@
  with a payload that is not empty, which causes the creation to fail,
  leading toa null dereference in the keyring destructor.
 upstream: released (2.6.12.5)
-2.6.8-sarge: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: N/A
 linux-2.6: released (2.6.12-3) [linux-2.6.12.5.patch]
-2.6.8: 
+2.6.8: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-2456
==============================================================================
--- patch-tracking/CVE-2005-2456	(original)
+++ patch-tracking/CVE-2005-2456	Wed Jan  4 09:58:10 2006
@@ -29,5 +29,5 @@
 2.4.16-woody-security: 
 2.4.17-woody-security-hppa: 
 2.4.17-woody-security-ia64: 
-2.6.8: 
+2.6.8: N/A
 2.4.18-woody-security-hppa: 

Modified: patch-tracking/CVE-2005-2459
==============================================================================
--- patch-tracking/CVE-2005-2459	(original)
+++ patch-tracking/CVE-2005-2459	Wed Jan  4 09:58:10 2006
@@ -22,11 +22,10 @@
  jmm> N/A? Thich version is correct?
 upstream: released (2.6.12.6)
 linux-2.6: 
-2.6.8-sarge: N/A
 2.6.8-sarge-security: released (2.6.8-16sarge1) [linux-zlib-fixes.dpatch]
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: released (2.4.27-10sarge1) [182_linux-zlib-fixes.diff]
-2.6.8: 
+2.6.8: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-2492
==============================================================================
--- patch-tracking/CVE-2005-2492	(original)
+++ patch-tracking/CVE-2005-2492	Wed Jan  4 09:58:10 2006
@@ -23,11 +23,10 @@
  state) or read from arbitrary memory via crafted input.
 upstream: released (2.6.13.1)
 linux-2.6: released (2.6.12-7, 2.6.13-1) [sendmsg-DoS.patch, linux-2.6.13.1.patch]
-2.6.8-sarge: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: N/A
-2.6.8: 
+2.6.8: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-2553
==============================================================================
--- patch-tracking/CVE-2005-2553	(original)
+++ patch-tracking/CVE-2005-2553	Wed Jan  4 09:58:10 2006
@@ -12,11 +12,10 @@
 Bugs: 
 upstream: released (2.4.29)
 linux-2.6: N/A
-2.6.8-sarge: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sid/sarge: pending [184_arch-x86_64-ia32-ptrace32-oops.diff]
 2.4.27-sarge-security: released (2.4.27-10sarge1) [184_arch-x86_64-ia32-ptrace32-oops.diff]
-2.6.8: 
+2.6.8: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-2555
==============================================================================
--- patch-tracking/CVE-2005-2555	(original)
+++ patch-tracking/CVE-2005-2555	Wed Jan  4 09:58:10 2006
@@ -12,7 +12,7 @@
 linux-2.6: pending
 2.6.8-sarge-security: pending (2.6.8-16sarge2)
 2.4.27-sarge-security: pending (2.4.27-10sarge2)
-2.6.8: 
+2.6.8: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-2709
==============================================================================
--- patch-tracking/CVE-2005-2709	(original)
+++ patch-tracking/CVE-2005-2709	Wed Jan  4 09:58:10 2006
@@ -22,7 +22,7 @@
 2.6.8-sarge-security: pending (2.6.8-16sarge2) [sysctl-unregistration-oops.dpatch]
 2.4.27-sarge-security: pending (2.4.27-10sarge2) [196_sysctl-unregistration-oops.patch]
 2.4.27: 
-2.6.8: 
+2.6.8: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-2800
==============================================================================
--- patch-tracking/CVE-2005-2800	(original)
+++ patch-tracking/CVE-2005-2800	Wed Jan  4 09:58:10 2006
@@ -14,7 +14,7 @@
 linux-2.6: 
 2.6.8-sarge-security: pending (2.6.8-16sarge2)
 2.4.27-sarge-security: 
-2.6.8: 
+2.6.8: N/A
 2.4.19-woody-security: N/A
 2.4.18-woody-security: N/A
 2.4.17-woody-security: N/A

Modified: patch-tracking/CVE-2005-2801
==============================================================================
--- patch-tracking/CVE-2005-2801	(original)
+++ patch-tracking/CVE-2005-2801	Wed Jan  4 09:58:10 2006
@@ -13,7 +13,7 @@
  blocks, which could prevent default ACLs from being applied.
 Bugs: 332381
 upstream: released (2.6.11)
-2.6.8-sarge-security: released (2.6.8-16-sarge1) [fs_ext2_ext3_xattr-sharing.dpatch]
+2.6.8-sarge-security: released (2.6.8-16sarge1) [fs_ext2_ext3_xattr-sharing.dpatch]
 2.4.27-sarge-security: released (2.4.27-10sarge1) [178_fs_ext2_ext3_xattr-sharing.diff]
 2.4.27-sid: released (2.4.27-12) [178_fs_ext2_ext3_xattr-sharing.diff]
 linux-2.6: N/A
@@ -23,5 +23,5 @@
 2.4.16-woody-security: 
 2.4.17-woody-security-hppa: 
 2.4.17-woody-security-ia64: 
-2.6.8: 
+2.6.8: N/A
 2.4.18-woody-security-hppa: 

Modified: patch-tracking/CVE-2005-2872
==============================================================================
--- patch-tracking/CVE-2005-2872	(original)
+++ patch-tracking/CVE-2005-2872	Wed Jan  4 09:58:10 2006
@@ -29,5 +29,5 @@
 2.4.16-woody-security: 
 2.4.17-woody-security-hppa: 
 2.4.17-woody-security-ia64: 
-2.6.8: 
+2.6.8: N/A
 2.4.18-woody-security-hppa: 

Modified: patch-tracking/CVE-2005-2973
==============================================================================
--- patch-tracking/CVE-2005-2973	(original)
+++ patch-tracking/CVE-2005-2973	Wed Jan  4 09:58:10 2006
@@ -8,13 +8,11 @@
 Notes: 
  submitted for inclusion in 2.4.32-rc2
 upstream: released (2.6.14-rc4)
-2.6.13: released (2.6.13+2.6.14-rc4-0experimental.1)
 2.6.8-sarge-security: pending (2.6.8-16sarge2) [net-ipv6-udp_v6_get_port-loop.patch]
-2.6.8-sarge: pending (2.6.8-17)
 2.4.27-sarge-security: pending (2.4.27-10sarge2) [195_net-ipv6-udp_v6_get_port-loop.diff]
 2.4.27-sarge/sid: pending (2.4.27-12)
-linux-2.6: 
-2.6.8: 
+linux-2.6: released (2.6.13+2.6.14-rc4-0experimental.1)
+2.6.8: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3044
==============================================================================
--- patch-tracking/CVE-2005-3044	(original)
+++ patch-tracking/CVE-2005-3044	Wed Jan  4 09:58:10 2006
@@ -25,7 +25,7 @@
 2.6.8-sarge-security: pending (2.6.8-16sarge2) [lost-fput-in-32bit-ioctl-on-x86-64.dpatch]
 2.4.27-sid/sarge: needed
 2.4.27-sarge-security: needed
-2.6.8: 
+2.6.8: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3053
==============================================================================
--- patch-tracking/CVE-2005-3053	(original)
+++ patch-tracking/CVE-2005-3053	Wed Jan  4 09:58:10 2006
@@ -20,7 +20,7 @@
 2.6.8-sarge-security: pending (2.6.8-16sarge2) [mempolicy-check-mode.dpatch]
 2.4.27-sid/sarge: N/A
 2.4.27-sarge-security: N/A
-2.6.8: 
+2.6.8: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3180
==============================================================================
--- patch-tracking/CVE-2005-3180	(original)
+++ patch-tracking/CVE-2005-3180	Wed Jan  4 09:58:10 2006
@@ -19,7 +19,7 @@
 2.6.8-sarge-security: pending (2.6.8-16sarge2) [orinoco-info-leak.dpatch]
 2.4.27-sid/sarge: released (2.4.27-12) [192_orinoco-info-leak.diff]
 2.4.27-sarge-security: pending [192_orinoco-info-leak.diff]
-2.6.8: 
+2.6.8: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3181
==============================================================================
--- patch-tracking/CVE-2005-3181	(original)
+++ patch-tracking/CVE-2005-3181	Wed Jan  4 09:58:10 2006
@@ -11,13 +11,12 @@
  2.4 isn't vulnerable because AUDITSYSCALL doesn't exist in 2.4
 Bugs: 
 upstream: released (2.6.13.4)
-2.6.13: released (2.6.13+2.6.14-rc4-0experimental.1)
 2.6.8-sarge-security: pending (2.6.8-16sarge2)
 2.6.8-sarge: pending (2.6.8-17)
 2.4.27-sarge-security: N/A
 2.4.27-sarge/sid: N/A
-linux-2.6: 
-2.6.8: 
+linux-2.6: released (2.6.13+2.6.14-rc4-0experimental.1)
+2.6.8: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3257
==============================================================================
--- patch-tracking/CVE-2005-3257	(original)
+++ patch-tracking/CVE-2005-3257	Wed Jan  4 09:58:10 2006
@@ -14,11 +14,10 @@
  jmm> sorted out.
 upstream: released (2.4.32-rc3), released (2.6.15-rc1), pending (2.6.14.4)
 2.6.8-sarge-security: pending (2.6.8-16sarge2) [setkeys-needs-root-1.dpatch, setkeys-needs-root-2.dpatch]
-2.6.8-sarge: 
 2.4.27-sarge-security: pending (2.4.27-10sarge2) [197_setkeys-needs-root-1.diff, 197_setkeys-needs-root-2.diff]
 2.4.27-sarge/sid: 
 linux-2.6: pending (2.6.14-4) [setkeys-needs-root-1.patch, setkeys-needs-root-2.patch]
-2.6.8: needed
+2.6.8: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3271
==============================================================================
--- patch-tracking/CVE-2005-3271	(original)
+++ patch-tracking/CVE-2005-3271	Wed Jan  4 09:58:10 2006
@@ -21,5 +21,5 @@
 2.4.16-woody-security: 
 2.4.17-woody-security-hppa: 
 2.4.17-woody-security-ia64: 
-2.6.8: 
+2.6.8: N/A
 2.4.18-woody-security-hppa: 

Modified: patch-tracking/CVE-2005-3272
==============================================================================
--- patch-tracking/CVE-2005-3272	(original)
+++ patch-tracking/CVE-2005-3272	Wed Jan  4 09:58:10 2006
@@ -17,5 +17,5 @@
 2.4.16-woody-security: 
 2.4.17-woody-security-hppa: 
 2.4.17-woody-security-ia64: 
-2.6.8: 
+2.6.8: N/A
 2.4.18-woody-security-hppa: 

Modified: patch-tracking/CVE-2005-3273
==============================================================================
--- patch-tracking/CVE-2005-3273	(original)
+++ patch-tracking/CVE-2005-3273	Wed Jan  4 09:58:10 2006
@@ -19,5 +19,5 @@
 2.4.16-woody-security: 
 2.4.17-woody-security-hppa: 
 2.4.17-woody-security-ia64: 
-2.6.8: 
+2.6.8: N/A
 2.4.18-woody-security-hppa: 

Modified: patch-tracking/CVE-2005-3274
==============================================================================
--- patch-tracking/CVE-2005-3274	(original)
+++ patch-tracking/CVE-2005-3274	Wed Jan  4 09:58:10 2006
@@ -15,7 +15,7 @@
 linux-2.6: released (2.6.13-1)
 2.6.8-sarge-security: released (2.6.8-16sarge1) [net-ipv4-ipvs-conn_tab-race.dpatch]
 2.4.27-sarge-security: pending (2.4.27-10sarge1)
-2.6.8: 
+2.6.8: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3275
==============================================================================
--- patch-tracking/CVE-2005-3275	(original)
+++ patch-tracking/CVE-2005-3275	Wed Jan  4 09:58:10 2006
@@ -14,7 +14,7 @@
 2.6.8-sarge-security: released (2.6.8-16sarge1) [netfilter-NAT-memory-corruption.dpatch]
 2.4.27-sarge-security: released (2.4.27-10sarge1) [174_net-ipv4-netfilter-nat-mem.diff]
 linux-2.6: 
-2.6.8: 
+2.6.8: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3276
==============================================================================
--- patch-tracking/CVE-2005-3276	(original)
+++ patch-tracking/CVE-2005-3276	Wed Jan  4 09:58:10 2006
@@ -12,7 +12,7 @@
 linux-2.6: 
 2.6.8-sarge-security: released (2.6.8-16sarge1) [sys_get_thread_area-leak.dpatch]
 2.4.27-sarge-security: N/A
-2.6.8: 
+2.6.8: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3847
==============================================================================
--- patch-tracking/CVE-2005-3847	(original)
+++ patch-tracking/CVE-2005-3847	Wed Jan  4 09:58:10 2006
@@ -20,9 +20,8 @@
 upstream: released (2.6.12.6, 2.6.13)
 linux-2.6: N/A
 2.6.8-sarge-security: pending (2.6.8-16sarge2) [nptl-signal-delivery-deadlock-fix.dpatch]
-2.6.8: needed
+2.6.8: N/A
 2.4.27-sarge-security: N/A
-2.4.27: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2005-3848
==============================================================================
--- patch-tracking/CVE-2005-3848	(original)
+++ patch-tracking/CVE-2005-3848	Wed Jan  4 09:58:10 2006
@@ -19,12 +19,11 @@
  that cause the ip_append_data function to fail, aka "DST leak in
  icmp_push_reply."
 upstream: released (2.6.12.6, 2.6.13)
-2.6.8-sarge: 
 2.6.8-sarge-security: pending (2.6.8-16sarge2) [fix-dst-leak-in-icmp_push_reply.dpatch]
 2.4.27-sid/sarge: released (2.4.27-12) [188_fix-dst-leak-in-icmp_push_reply.diff]
 2.4.27-sarge-security: pending (2.4.27-10sarge2) [188_fix-dst-leak-in-icmp_push_reply.diff]
 linux-2.6: 
-2.6.8: 
+2.6.8: N/A
 2.4.19-woody-security: N/A
 2.4.18-woody-security: N/A
 2.4.17-woody-security: N/A



More information about the Kernel-svn-changes mailing list