[kernel] r5502 - patch-tracking

Dann Frazier dannf at costa.debian.org
Tue Jan 17 16:26:46 UTC 2006


Author: dannf
Date: Tue Jan 17 16:26:44 2006
New Revision: 5502

Modified:
   patch-tracking/CVE-2005-3044
   patch-tracking/CVE-2005-3105
Log:
Moritz & I agreed to ignore these for sarge2


Modified: patch-tracking/CVE-2005-3044
==============================================================================
--- patch-tracking/CVE-2005-3044	(original)
+++ patch-tracking/CVE-2005-3044	Tue Jan 17 16:26:44 2006
@@ -22,7 +22,7 @@
 upstream: released (2.6.13.2)
 linux-2.6: released (2.6.12-7, 2.6.13-1) [lost-fput-in-32bit-ioctl-on-x86-64.patch, linux-2.6.13.2.patch]
 2.6.8-sarge-security: pending (2.6.8-16sarge2) [lost-fput-in-32bit-ioctl-on-x86-64.dpatch]
-2.4.27-sid/sarge: needed
+2.4.27-sid/sarge: ignored (2.4.27-10sarge2)
 2.4.27-sarge-security: needed
 2.4.19-woody-security: 
 2.4.18-woody-security: 

Modified: patch-tracking/CVE-2005-3105
==============================================================================
--- patch-tracking/CVE-2005-3105	(original)
+++ patch-tracking/CVE-2005-3105	Tue Jan 17 16:26:44 2006
@@ -20,11 +20,15 @@
  ia64 Montecito CPU do not maintain cache coherency correctly, which can be
  exploited by a local DoS.
  http://linux.bkbits.net:8080/linux-2.6/cset@4248d4019z8HvgrPAji51TKrWiV2uw?nav=index.html|src/|src/mm|related/mm/mprotect.c
+ .
+ dannf> These CPUs aren't available on the market yet, and I'm not sure
+ dannf> 2.4 is vulnerable.  Will have to attempt to reproduce when I can
+ dannf> get my hands on some hardware.  Ignoring for sarge2.
 Bugs: 332569
 upstream: 2.6.12
 2.6.8-sarge-security: released (2.6.8-16sarge1) [mckinley_icache.dpatch]
 2.4.27-sid/sarge: needed
-2.4.27-sarge-security: needed
+2.4.27-sarge-security: ignored (2.4.27-10sarge2)
 linux-2.6: N/A
 2.4.19-woody-security: 
 2.4.18-woody-security: 



More information about the Kernel-svn-changes mailing list