[kernel] r6570 - patch-tracking

Moritz Muehlenhoff jmm-guest at costa.debian.org
Tue May 16 05:07:19 UTC 2006


Author: jmm-guest
Date: Tue May 16 05:07:17 2006
New Revision: 6570

Added:
   patch-tracking/CVE-2006-1864
   patch-tracking/CVE-2006-2274
   patch-tracking/CVE-2006-2275
Modified:
   patch-tracking/CVE-2005-3359
   patch-tracking/CVE-2006-1056
   patch-tracking/CVE-2006-1342
   patch-tracking/CVE-2006-1522

Log:
more issues


Modified: patch-tracking/CVE-2005-3359
==============================================================================
--- patch-tracking/CVE-2005-3359	(original)
+++ patch-tracking/CVE-2005-3359	Tue May 16 05:07:17 2006
@@ -13,7 +13,7 @@
 Bugs: 
 upstream: 
 linux-2.6:
-2.6.8-sarge-security: 
+2.6.8-sarge-security: needed
 2.4.27-sarge-security: 
 2.4.27:
 2.4.19-woody-security: 

Modified: patch-tracking/CVE-2006-1056
==============================================================================
--- patch-tracking/CVE-2006-1056	(original)
+++ patch-tracking/CVE-2006-1056	Tue May 16 05:07:17 2006
@@ -3,7 +3,7 @@
 Description: x87 inter process information leak
 Notes: 
 Bugs: 
-upstream: 
+upstream: released (2.6.16.9)
 linux-2.6:
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 

Modified: patch-tracking/CVE-2006-1342
==============================================================================
--- patch-tracking/CVE-2006-1342	(original)
+++ patch-tracking/CVE-2006-1342	Tue May 16 05:07:17 2006
@@ -8,12 +8,13 @@
  and (3) accept functions, which allows local users to obtain portions of
  potentially sensitive memory.
 Notes: 
+ jmm> getorigdst() requires the fix in 2.6.8, inet_getname() is already fixed
 Bugs: 
 upstream: 
 linux-2.6:
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
-2.4.27:
+2.4.27: needed
 2.4.19-woody-security: 
 2.4.18-woody-security: 
 2.4.17-woody-security: 

Modified: patch-tracking/CVE-2006-1522
==============================================================================
--- patch-tracking/CVE-2006-1522	(original)
+++ patch-tracking/CVE-2006-1522	Tue May 16 05:07:17 2006
@@ -1,16 +1,17 @@
 Candidate: CVE-2006-1522
 References: 
 Description: 
-Notes: 
+Notes:
+ jmm> Vulnerable code not present in 2.6.8 and 2.4
 Bugs: 
 upstream: 
 linux-2.6:
-2.6.8-sarge-security: 
-2.4.27-sarge-security: 
-2.4.27:
-2.4.19-woody-security: 
-2.4.18-woody-security: 
-2.4.17-woody-security: 
-2.4.16-woody-security: 
-2.4.17-woody-security-hppa: 
-2.4.17-woody-security-ia64: 
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security: N/A
+2.4.27: N/A
+2.4.19-woody-security: N/A
+2.4.18-woody-security: N/A
+2.4.17-woody-security: N/A
+2.4.16-woody-security: N/A
+2.4.17-woody-security-hppa: N/A
+2.4.17-woody-security-ia64: N/A

Added: patch-tracking/CVE-2006-1864
==============================================================================
--- (empty file)
+++ patch-tracking/CVE-2006-1864	Tue May 16 05:07:17 2006
@@ -0,0 +1,16 @@
+Candidate: CVE-2006-1864
+References: smbfs chroot issue
+Description: 
+Notes: 
+Bugs: 
+upstream: 
+linux-2.6:
+2.6.8-sarge-security: 
+2.4.27-sarge-security: 
+2.4.27:
+2.4.19-woody-security: 
+2.4.18-woody-security: 
+2.4.17-woody-security: 
+2.4.16-woody-security: 
+2.4.17-woody-security-hppa: 
+2.4.17-woody-security-ia64: 

Added: patch-tracking/CVE-2006-2274
==============================================================================
--- (empty file)
+++ patch-tracking/CVE-2006-2274	Tue May 16 05:07:17 2006
@@ -0,0 +1,16 @@
+Candidate: CVE-2006-2274
+References: 
+Description: 
+Notes: 
+Bugs: 
+upstream: 
+linux-2.6:
+2.6.8-sarge-security: 
+2.4.27-sarge-security: 
+2.4.27:
+2.4.19-woody-security: 
+2.4.18-woody-security: 
+2.4.17-woody-security: 
+2.4.16-woody-security: 
+2.4.17-woody-security-hppa: 
+2.4.17-woody-security-ia64: 

Added: patch-tracking/CVE-2006-2275
==============================================================================
--- (empty file)
+++ patch-tracking/CVE-2006-2275	Tue May 16 05:07:17 2006
@@ -0,0 +1,16 @@
+Candidate: CVE-2006-2275
+References: 
+Description: 
+Notes: 
+Bugs: 
+upstream: 
+linux-2.6:
+2.6.8-sarge-security: 
+2.4.27-sarge-security: 
+2.4.27:
+2.4.19-woody-security: 
+2.4.18-woody-security: 
+2.4.17-woody-security: 
+2.4.16-woody-security: 
+2.4.17-woody-security-hppa: 
+2.4.17-woody-security-ia64: 



More information about the Kernel-svn-changes mailing list