[kernel] r5329 - patch-tracking

Moritz Muehlenhoff jmm-guest at costa.debian.org
Fri Jan 6 23:18:14 UTC 2006


Author: jmm-guest
Date: Fri Jan  6 23:18:13 2006
New Revision: 5329

Modified:
   patch-tracking/CVE-2003-0465
   patch-tracking/CVE-2004-0181
   patch-tracking/CVE-2004-0816
Log:
CVE-2003-0465 resolved for Sarge
CVE-2004-0816 resolved for all
CVE-2004-0181 resolved for all


Modified: patch-tracking/CVE-2003-0465
==============================================================================
--- patch-tracking/CVE-2003-0465	(original)
+++ patch-tracking/CVE-2003-0465	Fri Jan  6 23:18:13 2006
@@ -17,12 +17,15 @@
  .
  dannf> Since this is minor, I'm gonna consider the existing patch "good enough"
  dannf> and mark the 2.4 issues as complete.
+ jmm> Alan Cox wrote in above URL that these will be addressed during the 2.5
+ jmm> cycle, so I guess it's pretty safe to make all the 2.6 kernels as fixed
+ jmm> The ramifications are minor anyway
 Bugs: 
 upstream: 
-linux-2.6: 
-2.6.8-sarge-security: 
+linux-2.6: N/A
+2.6.8-sarge-security: N/A
 2.4.27-sarge-security: released (2.4.27-8)
-2.6.8: 
+2.6.8: N/A
 2.4.19-woody-security: pending (2.4.19-4.woody3)
 2.4.18-woody-security: pending (2.4.18-14.5)
 2.4.17-woody-security: pending (2.4.17-1woody4)

Modified: patch-tracking/CVE-2004-0181
==============================================================================
--- patch-tracking/CVE-2004-0181	(original)
+++ patch-tracking/CVE-2004-0181	Fri Jan  6 23:18:13 2006
@@ -1,4 +1,4 @@
-Candidate: CVE-2005-0181
+Candidate: CVE-2004-0181
 References: 
  http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html
  http://security.gentoo.org/glsa/glsa-200407-02.xml
@@ -12,15 +12,17 @@
  in-memory data is written to the device for the JFS file system, which allows
  local users to obtain sensitive information by reading the raw device.
 Notes: 
+ jmm> JFS was merged into the 2.4 kernel in 2.4.20-pre4 and into 2.6 at 2.6.5-rc2,
+ jmm> so I'm marking all versions N/A
 Bugs: 
-upstream: released (2.4.26-pre5)
-linux-2.6:
-2.6.8-sarge-security: 
+upstream: released (2.4.26-pre5), released (2.6.5-rc2)
+linux-2.6: N/A
+2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
-2.6.8: 
-2.4.19-woody-security: 
-2.4.18-woody-security: 
-2.4.17-woody-security: 
-2.4.16-woody-security: 
-2.4.17-woody-security-hppa: 
-2.4.17-woody-security-ia64: 
+2.6.8: N/A
+2.4.19-woody-security: N/A
+2.4.18-woody-security: N/A
+2.4.17-woody-security: N/A
+2.4.16-woody-security: N/A
+2.4.17-woody-security-hppa: N/A
+2.4.17-woody-security-ia64: N/A

Modified: patch-tracking/CVE-2004-0816
==============================================================================
--- patch-tracking/CVE-2004-0816	(original)
+++ patch-tracking/CVE-2004-0816	Fri Jan  6 23:18:13 2006
@@ -14,17 +14,23 @@
  Integer underflow in the firewall logging rules for iptables in Linux before
  2.6.8 allows remote attackers to cause a denial of service (application crash)
  via a malformed IP packet.
-Notes: 
+Notes:
+ jmm> Quoting from http://groups.google.com/group/nz.comp/msg/71ec927b491f247d: 
+ jmm>   The bug, discovered by Richard Hart, does not affect the 2.4 series kernel
+ jmm> Quoting from http://www.novell.com/linux/security/advisories/2004_37_kernel.html:
+ jmm>   This problem has already been fixed in the 2.6.8 upstream Linux kernel,
+ jmm>   this update contains a backport of the fix.
+ jmm> So I'm marking all kernels N/A
 Bugs: 
 upstream: 
-linux-2.6: 
-2.6.8-sarge-security: 
-2.4.27-sarge-security: 
-2.6.8: 
-2.4.19-woody-security: 
-2.4.18-woody-security: 
-2.4.17-woody-security: 
-2.4.16-woody-security: 
-2.4.17-woody-security-hppa: 
-2.4.17-woody-security-ia64: 
-2.4.18-woody-security-hppa: 
+linux-2.6: N/A
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security: N/A
+2.6.8: N/A
+2.4.19-woody-security: N/A
+2.4.18-woody-security: N/A
+2.4.17-woody-security: N/A
+2.4.16-woody-security: N/A
+2.4.17-woody-security-hppa: N/A
+2.4.17-woody-security-ia64: N/A
+2.4.18-woody-security-hppa: N/A



More information about the Kernel-svn-changes mailing list