summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2007-04-30 17:16:04 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2007-04-30 17:16:04 +0000
commitdfce9f8dc961eaa94eb9c9ac11012f02407e74a9 (patch)
tree3ae4a2113dd58534ed0ede5ea5bc5bac81f2bdac
parent6471f3dab8b9f08bf043c1fcc49f8a0bf467300a (diff)
CVE-2007-0001 is RHEL-specific
We won't backport ipt_recent module to Sarge git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@775 e094ebfe-e918-0410-adfb-c712417f3574
-rw-r--r--active/CVE-2005-28732
-rw-r--r--active/CVE-2006-58712
-rw-r--r--active/CVE-2007-000121
-rw-r--r--active/block-all-signals-race1
4 files changed, 18 insertions, 8 deletions
diff --git a/active/CVE-2005-2873 b/active/CVE-2005-2873
index 3b6ec4350..3b3066ce8 100644
--- a/active/CVE-2005-2873
+++ b/active/CVE-2005-2873
@@ -18,6 +18,8 @@ Notes:
horms> No patch that is acceptable upstream is available
http://lists.debian.org/debian-kernel/2005/09/msg00257.html
jmm> There's now a complete rewrite by Patrick McHardy in 2.6.18
+ jmm> This change won't be backported to Sarge, if this poses a problem an update
+ jmm> to Etch is required
upstream: released (2.6.18)
Bugs: 332381, 332231, 332228
linux-2.6: released (2.6.18-1)
diff --git a/active/CVE-2006-5871 b/active/CVE-2006-5871
index fb7b49874..5e1f156f7 100644
--- a/active/CVE-2006-5871
+++ b/active/CVE-2006-5871
@@ -10,3 +10,5 @@ linux-2.6:
2.4.27-sarge-security: released (2.4.27-10sarge5) [237_smbfs-honor-mount-opts.diff, 240_smbfs-honor-mount-opts-2.diff]
2.6.15-dapper-security:
2.6.17-edgy-security:
+2.6.18-etch-security:
+
diff --git a/active/CVE-2007-0001 b/active/CVE-2007-0001
index 0325849f1..8449e07f3 100644
--- a/active/CVE-2007-0001
+++ b/active/CVE-2007-0001
@@ -3,12 +3,17 @@ References:
Description:
Ubuntu-Description:
Notes:
+ jmm> From Red Hat Bugzilla:
+ jmm> Comment [72]#20 From Marcel Holtmann on 2007-02-20 03:15 EST
+ jmm> This issue affects _only_ the Red Hat Enterprise Linux 4 kernel. Other kernel
+ jmm> versions or upstream kernels are _not_ known be affected.
+ jmm> So marking all entries N/A
Bugs:
-upstream:
-linux-2.6:
-2.6.18-etch-security:
-2.6.8-sarge-security:
-2.4.27-sarge-security:
-2.6.15-dapper-security:
-2.6.17-edgy-security:
-2.6.20-feisty-security:
+upstream: N/A
+linux-2.6: N/A
+2.6.18-etch-security: N/A
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security: N/A
+2.6.15-dapper-security: N/A
+2.6.17-edgy-security: N/A
+2.6.20-feisty-security: N/A
diff --git a/active/block-all-signals-race b/active/block-all-signals-race
index a70c16467..7f98933fc 100644
--- a/active/block-all-signals-race
+++ b/active/block-all-signals-race
@@ -13,4 +13,5 @@ upstream:
linux-2.6: pending (2.6.15.5)
2.6.8-sarge-security:
2.4.27-sarge-security:
+2.6.18-etch-security:

© 2014-2024 Faster IT GmbH | imprint | privacy policy