[kernel] r5345 - patch-tracking
Moritz Muehlenhoff
jmm-guest at costa.debian.org
Sun Jan 8 14:02:08 UTC 2006
Author: jmm-guest
Date: Sun Jan 8 14:02:06 2006
New Revision: 5345
Modified:
patch-tracking/CVE-2004-0229
patch-tracking/CVE-2004-0619
Log:
These two are resolved for Sarge.
Modified: patch-tracking/CVE-2004-0229
==============================================================================
--- patch-tracking/CVE-2004-0229 (original)
+++ patch-tracking/CVE-2004-0229 Sun Jan 8 14:02:06 2006
@@ -2,12 +2,13 @@
References:
Description:
Notes:
+ jmm> 2.4 is not affected by this problem.
Bugs:
-upstream:
-linux-2.6:
-2.6.8-sarge-security:
+upstream: released (2.6.6)
+linux-2.6: N/A
+2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
-2.6.8:
+2.6.8: N/A
2.4.19-woody-security: N/A
2.4.18-woody-security: N/A
2.4.17-woody-security: N/A
Modified: patch-tracking/CVE-2004-0619
==============================================================================
--- patch-tracking/CVE-2004-0619 (original)
+++ patch-tracking/CVE-2004-0619 Sun Jan 8 14:02:06 2006
@@ -13,16 +13,17 @@
and possibly execute arbitrary code via a negative add_dsa_buf_bytes
variable, which leads to a buffer overflow.
Notes:
- jmm> This is apparently not in main line, but only shipped in Red Hat kernels
+ jmm> I've checked 2.6.8, 2.4.27 and 2.6.14, this is not included in the
+ jmm> stock kernel, only in Red Hat's. I'm marking Woody N/A as well.
Bugs:
-upstream:
-linux-2.6:
-2.6.8-sarge-security:
-2.4.27-sarge-security:
-2.6.8:
-2.4.19-woody-security:
-2.4.18-woody-security:
-2.4.17-woody-security:
-2.4.16-woody-security:
-2.4.17-woody-security-hppa:
-2.4.17-woody-security-ia64:
+upstream: N/A
+linux-2.6: N/A
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security: N/A
+2.6.8: N/A
+2.4.19-woody-security: N/A
+2.4.18-woody-security: N/A
+2.4.17-woody-security: N/A
+2.4.16-woody-security: N/A
+2.4.17-woody-security-hppa: N/A
+2.4.17-woody-security-ia64: N/A
More information about the Kernel-svn-changes
mailing list