[kernel] r6570 - patch-tracking
Moritz Muehlenhoff
jmm-guest at costa.debian.org
Tue May 16 05:07:19 UTC 2006
Author: jmm-guest
Date: Tue May 16 05:07:17 2006
New Revision: 6570
Added:
patch-tracking/CVE-2006-1864
patch-tracking/CVE-2006-2274
patch-tracking/CVE-2006-2275
Modified:
patch-tracking/CVE-2005-3359
patch-tracking/CVE-2006-1056
patch-tracking/CVE-2006-1342
patch-tracking/CVE-2006-1522
Log:
more issues
Modified: patch-tracking/CVE-2005-3359
==============================================================================
--- patch-tracking/CVE-2005-3359 (original)
+++ patch-tracking/CVE-2005-3359 Tue May 16 05:07:17 2006
@@ -13,7 +13,7 @@
Bugs:
upstream:
linux-2.6:
-2.6.8-sarge-security:
+2.6.8-sarge-security: needed
2.4.27-sarge-security:
2.4.27:
2.4.19-woody-security:
Modified: patch-tracking/CVE-2006-1056
==============================================================================
--- patch-tracking/CVE-2006-1056 (original)
+++ patch-tracking/CVE-2006-1056 Tue May 16 05:07:17 2006
@@ -3,7 +3,7 @@
Description: x87 inter process information leak
Notes:
Bugs:
-upstream:
+upstream: released (2.6.16.9)
linux-2.6:
2.6.8-sarge-security:
2.4.27-sarge-security:
Modified: patch-tracking/CVE-2006-1342
==============================================================================
--- patch-tracking/CVE-2006-1342 (original)
+++ patch-tracking/CVE-2006-1342 Tue May 16 05:07:17 2006
@@ -8,12 +8,13 @@
and (3) accept functions, which allows local users to obtain portions of
potentially sensitive memory.
Notes:
+ jmm> getorigdst() requires the fix in 2.6.8, inet_getname() is already fixed
Bugs:
upstream:
linux-2.6:
2.6.8-sarge-security:
2.4.27-sarge-security:
-2.4.27:
+2.4.27: needed
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
Modified: patch-tracking/CVE-2006-1522
==============================================================================
--- patch-tracking/CVE-2006-1522 (original)
+++ patch-tracking/CVE-2006-1522 Tue May 16 05:07:17 2006
@@ -1,16 +1,17 @@
Candidate: CVE-2006-1522
References:
Description:
-Notes:
+Notes:
+ jmm> Vulnerable code not present in 2.6.8 and 2.4
Bugs:
upstream:
linux-2.6:
-2.6.8-sarge-security:
-2.4.27-sarge-security:
-2.4.27:
-2.4.19-woody-security:
-2.4.18-woody-security:
-2.4.17-woody-security:
-2.4.16-woody-security:
-2.4.17-woody-security-hppa:
-2.4.17-woody-security-ia64:
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security: N/A
+2.4.27: N/A
+2.4.19-woody-security: N/A
+2.4.18-woody-security: N/A
+2.4.17-woody-security: N/A
+2.4.16-woody-security: N/A
+2.4.17-woody-security-hppa: N/A
+2.4.17-woody-security-ia64: N/A
Added: patch-tracking/CVE-2006-1864
==============================================================================
--- (empty file)
+++ patch-tracking/CVE-2006-1864 Tue May 16 05:07:17 2006
@@ -0,0 +1,16 @@
+Candidate: CVE-2006-1864
+References: smbfs chroot issue
+Description:
+Notes:
+Bugs:
+upstream:
+linux-2.6:
+2.6.8-sarge-security:
+2.4.27-sarge-security:
+2.4.27:
+2.4.19-woody-security:
+2.4.18-woody-security:
+2.4.17-woody-security:
+2.4.16-woody-security:
+2.4.17-woody-security-hppa:
+2.4.17-woody-security-ia64:
Added: patch-tracking/CVE-2006-2274
==============================================================================
--- (empty file)
+++ patch-tracking/CVE-2006-2274 Tue May 16 05:07:17 2006
@@ -0,0 +1,16 @@
+Candidate: CVE-2006-2274
+References:
+Description:
+Notes:
+Bugs:
+upstream:
+linux-2.6:
+2.6.8-sarge-security:
+2.4.27-sarge-security:
+2.4.27:
+2.4.19-woody-security:
+2.4.18-woody-security:
+2.4.17-woody-security:
+2.4.16-woody-security:
+2.4.17-woody-security-hppa:
+2.4.17-woody-security-ia64:
Added: patch-tracking/CVE-2006-2275
==============================================================================
--- (empty file)
+++ patch-tracking/CVE-2006-2275 Tue May 16 05:07:17 2006
@@ -0,0 +1,16 @@
+Candidate: CVE-2006-2275
+References:
+Description:
+Notes:
+Bugs:
+upstream:
+linux-2.6:
+2.6.8-sarge-security:
+2.4.27-sarge-security:
+2.4.27:
+2.4.19-woody-security:
+2.4.18-woody-security:
+2.4.17-woody-security:
+2.4.16-woody-security:
+2.4.17-woody-security-hppa:
+2.4.17-woody-security-ia64:
More information about the Kernel-svn-changes
mailing list