[kernel] r5502 - patch-tracking
Dann Frazier
dannf at costa.debian.org
Tue Jan 17 16:26:46 UTC 2006
Author: dannf
Date: Tue Jan 17 16:26:44 2006
New Revision: 5502
Modified:
patch-tracking/CVE-2005-3044
patch-tracking/CVE-2005-3105
Log:
Moritz & I agreed to ignore these for sarge2
Modified: patch-tracking/CVE-2005-3044
==============================================================================
--- patch-tracking/CVE-2005-3044 (original)
+++ patch-tracking/CVE-2005-3044 Tue Jan 17 16:26:44 2006
@@ -22,7 +22,7 @@
upstream: released (2.6.13.2)
linux-2.6: released (2.6.12-7, 2.6.13-1) [lost-fput-in-32bit-ioctl-on-x86-64.patch, linux-2.6.13.2.patch]
2.6.8-sarge-security: pending (2.6.8-16sarge2) [lost-fput-in-32bit-ioctl-on-x86-64.dpatch]
-2.4.27-sid/sarge: needed
+2.4.27-sid/sarge: ignored (2.4.27-10sarge2)
2.4.27-sarge-security: needed
2.4.19-woody-security:
2.4.18-woody-security:
Modified: patch-tracking/CVE-2005-3105
==============================================================================
--- patch-tracking/CVE-2005-3105 (original)
+++ patch-tracking/CVE-2005-3105 Tue Jan 17 16:26:44 2006
@@ -20,11 +20,15 @@
ia64 Montecito CPU do not maintain cache coherency correctly, which can be
exploited by a local DoS.
http://linux.bkbits.net:8080/linux-2.6/cset@4248d4019z8HvgrPAji51TKrWiV2uw?nav=index.html|src/|src/mm|related/mm/mprotect.c
+ .
+ dannf> These CPUs aren't available on the market yet, and I'm not sure
+ dannf> 2.4 is vulnerable. Will have to attempt to reproduce when I can
+ dannf> get my hands on some hardware. Ignoring for sarge2.
Bugs: 332569
upstream: 2.6.12
2.6.8-sarge-security: released (2.6.8-16sarge1) [mckinley_icache.dpatch]
2.4.27-sid/sarge: needed
-2.4.27-sarge-security: needed
+2.4.27-sarge-security: ignored (2.4.27-10sarge2)
linux-2.6: N/A
2.4.19-woody-security:
2.4.18-woody-security:
More information about the Kernel-svn-changes
mailing list