diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2007-04-30 17:16:04 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2007-04-30 17:16:04 +0000 |
commit | dfce9f8dc961eaa94eb9c9ac11012f02407e74a9 (patch) | |
tree | 3ae4a2113dd58534ed0ede5ea5bc5bac81f2bdac | |
parent | 6471f3dab8b9f08bf043c1fcc49f8a0bf467300a (diff) |
CVE-2007-0001 is RHEL-specific
We won't backport ipt_recent module to Sarge
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@775 e094ebfe-e918-0410-adfb-c712417f3574
-rw-r--r-- | active/CVE-2005-2873 | 2 | ||||
-rw-r--r-- | active/CVE-2006-5871 | 2 | ||||
-rw-r--r-- | active/CVE-2007-0001 | 21 | ||||
-rw-r--r-- | active/block-all-signals-race | 1 |
4 files changed, 18 insertions, 8 deletions
diff --git a/active/CVE-2005-2873 b/active/CVE-2005-2873 index 3b6ec4350..3b3066ce8 100644 --- a/active/CVE-2005-2873 +++ b/active/CVE-2005-2873 @@ -18,6 +18,8 @@ Notes: horms> No patch that is acceptable upstream is available http://lists.debian.org/debian-kernel/2005/09/msg00257.html jmm> There's now a complete rewrite by Patrick McHardy in 2.6.18 + jmm> This change won't be backported to Sarge, if this poses a problem an update + jmm> to Etch is required upstream: released (2.6.18) Bugs: 332381, 332231, 332228 linux-2.6: released (2.6.18-1) diff --git a/active/CVE-2006-5871 b/active/CVE-2006-5871 index fb7b49874..5e1f156f7 100644 --- a/active/CVE-2006-5871 +++ b/active/CVE-2006-5871 @@ -10,3 +10,5 @@ linux-2.6: 2.4.27-sarge-security: released (2.4.27-10sarge5) [237_smbfs-honor-mount-opts.diff, 240_smbfs-honor-mount-opts-2.diff] 2.6.15-dapper-security: 2.6.17-edgy-security: +2.6.18-etch-security: + diff --git a/active/CVE-2007-0001 b/active/CVE-2007-0001 index 0325849f1..8449e07f3 100644 --- a/active/CVE-2007-0001 +++ b/active/CVE-2007-0001 @@ -3,12 +3,17 @@ References: Description: Ubuntu-Description: Notes: + jmm> From Red Hat Bugzilla: + jmm> Comment [72]#20 From Marcel Holtmann on 2007-02-20 03:15 EST + jmm> This issue affects _only_ the Red Hat Enterprise Linux 4 kernel. Other kernel + jmm> versions or upstream kernels are _not_ known be affected. + jmm> So marking all entries N/A Bugs: -upstream: -linux-2.6: -2.6.18-etch-security: -2.6.8-sarge-security: -2.4.27-sarge-security: -2.6.15-dapper-security: -2.6.17-edgy-security: -2.6.20-feisty-security: +upstream: N/A +linux-2.6: N/A +2.6.18-etch-security: N/A +2.6.8-sarge-security: N/A +2.4.27-sarge-security: N/A +2.6.15-dapper-security: N/A +2.6.17-edgy-security: N/A +2.6.20-feisty-security: N/A diff --git a/active/block-all-signals-race b/active/block-all-signals-race index a70c16467..7f98933fc 100644 --- a/active/block-all-signals-race +++ b/active/block-all-signals-race @@ -13,4 +13,5 @@ upstream: linux-2.6: pending (2.6.15.5) 2.6.8-sarge-security: 2.4.27-sarge-security: +2.6.18-etch-security: |