[kernel] r6904 - patch-tracking

Moritz Muehlenhoff jmm-guest at costa.debian.org
Mon Jun 26 22:03:07 UTC 2006


Author: jmm-guest
Date: Mon Jun 26 22:03:01 2006
New Revision: 6904

Modified:
   patch-tracking/CVE-2004-0565
   patch-tracking/CVE-2004-0587
   patch-tracking/CVE-2004-0814
   patch-tracking/CVE-2005-0916
   patch-tracking/CVE-2005-1264
   patch-tracking/CVE-2005-2459
   patch-tracking/CVE-2005-2709
   patch-tracking/CVE-2005-2800

Log:
record more linux-2.6 fixes


Modified: patch-tracking/CVE-2004-0565
==============================================================================
--- patch-tracking/CVE-2004-0565	(original)
+++ patch-tracking/CVE-2004-0565	Mon Jun 26 22:03:01 2006
@@ -18,7 +18,7 @@
  jmm> So it's N/A, but I don't know at which time it was fixed upstream
 Bugs: 
 upstream: released (2.4.27)
-linux-2.6: 
+linux-2.6: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.4.19-woody-security: released (2.4.19-4.woody3)

Modified: patch-tracking/CVE-2004-0587
==============================================================================
--- patch-tracking/CVE-2004-0587	(original)
+++ patch-tracking/CVE-2004-0587	Mon Jun 26 22:03:01 2006
@@ -29,7 +29,7 @@
  dannf> Nope; qla2xxx isn't in 2.4.27
 Bugs: 
 upstream: 
-linux-2.6: 
+linux-2.6: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.4.19-woody-security: N/A

Modified: patch-tracking/CVE-2004-0814
==============================================================================
--- patch-tracking/CVE-2004-0814	(original)
+++ patch-tracking/CVE-2004-0814	Mon Jun 26 22:03:01 2006
@@ -25,8 +25,8 @@
  is received during the switch.
 Notes: 
 Bugs: 
-upstream: 
-linux-2.6: 
+upstream: released (2.6.9)
+linux-2.6: N/A
 2.6.8-sarge-security: released (2.6.8-8) [tty-locking-fixes.dpatch, tty-locking-fixes2.dpatch, tty-locking-fixes3.dpatch, tty-locking-fixes4.dpatch, tty-locking-fixes5.dpatch, tty-locking-fixes6.dpatch, tty-locking-fixes7.dpatch, tty-locking-fixes8.dpatch]
 2.4.27-sarge-security: released (2.4.27-7) [093_tty_lockup.diff, 093_tty_lockup-2.diff, 115_tty_lockup-3.diff, 093-tty_lockup-3.diff]
 2.4.19-woody-security: 

Modified: patch-tracking/CVE-2005-0916
==============================================================================
--- patch-tracking/CVE-2005-0916	(original)
+++ patch-tracking/CVE-2005-0916	Mon Jun 26 22:03:01 2006
@@ -10,8 +10,8 @@
  to fail.
 Notes: 
 Bugs: 
-upstream: 
-linux-2.6:
+upstream: released (2.6.12)
+linux-2.6: released (2.6.12-1)
 2.6.8-sarge-security: released (2.6.8-16) [arch-ppc64-hugepage-aio-panic.dpatch]
 2.4.27-sarge-security: N/A
 2.4.19-woody-security: 

Modified: patch-tracking/CVE-2005-1264
==============================================================================
--- patch-tracking/CVE-2005-1264	(original)
+++ patch-tracking/CVE-2005-1264	Mon Jun 26 22:03:01 2006
@@ -18,7 +18,7 @@
  dannf> Code is very different in 2.4, don't know if its vulnerable
 Bugs: 
 upstream: released (2.6.11.10)
-linux-2.6: 
+linux-2.6: N/A
 2.6.8-sarge-security: released (2.6.8-16) [drivers-block-raw-ioctl.dpatch]
 2.4.27-sarge-security: ignored (2.4.27-10sarge3)
 2.4.19-woody-security: 

Modified: patch-tracking/CVE-2005-2459
==============================================================================
--- patch-tracking/CVE-2005-2459	(original)
+++ patch-tracking/CVE-2005-2459	Mon Jun 26 22:03:01 2006
@@ -17,8 +17,8 @@
  This is a bogus fix that was applied in 2.6.12.5 and reverted in 2.6.12.6
  http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.6
  We included the broken fix in the sarge1 releases, so this backs it out.
-upstream: released (2.6.12.6)
-linux-2.6: 
+upstream: released (2.6.12.5)
+linux-2.6: released (2.6.12.3)
 2.6.8-sarge-security: released (2.6.8-16sarge1) [linux-zlib-fixes.dpatch]
 2.4.27-sid/sarge: released (2.4.27-11) [182_linux-zlib-fixes.diff]
 2.4.27-sarge-security: released (2.4.27-10sarge1) [182_linux-zlib-fixes.diff]

Modified: patch-tracking/CVE-2005-2709
==============================================================================
--- patch-tracking/CVE-2005-2709	(original)
+++ patch-tracking/CVE-2005-2709	Mon Jun 26 22:03:01 2006
@@ -17,8 +17,8 @@
  .
  **THIS IS AN ABI CHANGE**
 Bug: 
-upstream: pending (2.6.14.1), released (2.4.33-pre1)
-linux-2.6: 
+upstream: released (2.6.14.1), released (2.4.33-pre1)
+linux-2.6: released (2.6.14-3)
 2.6.8-sarge-security: released (2.6.8-16sarge2) [sysctl-unregistration-oops.dpatch]
 2.4.27-sarge-security: released (2.4.27-10sarge2) [196_sysctl-unregistration-oops.patch]
 2.4.27: 

Modified: patch-tracking/CVE-2005-2800
==============================================================================
--- patch-tracking/CVE-2005-2800	(original)
+++ patch-tracking/CVE-2005-2800	Mon Jun 26 22:03:01 2006
@@ -12,7 +12,7 @@
  dannf> There's a trivial test case - can it be reproduce this on 2.4?
 Bugs: 
 upstream: released (2.6.12.6)
-linux-2.6: 
+linux-2.6: released (2.6.12-6)
 2.6.8-sarge-security: released (2.6.8-16sarge2)
 2.4.27-sarge-security: ignored (2.4.27-10sarge3)
 2.4.19-woody-security: N/A



More information about the Kernel-svn-changes mailing list