summaryrefslogtreecommitdiffstats
path: root/active
diff options
context:
space:
mode:
authordann frazier <dannf@debian.org>2006-09-25 19:13:15 +0000
committerdann frazier <dannf@debian.org>2006-09-25 19:13:15 +0000
commitd097008cdc5578ed8420b87e6b419e97252bedd8 (patch)
treefbdfd73c44db913a1fda474143cd699b2fba553b /active
parent1879cf5f760463ca036f3f415f6efce933fa4191 (diff)
2.6.17 is in etch now, stop tracking 2.6.16
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@597 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'active')
-rw-r--r--active/00boilerplate1
-rw-r--r--active/CVE-2002-07041
-rw-r--r--active/CVE-2004-08131
-rw-r--r--active/CVE-2004-11901
-rw-r--r--active/CVE-2004-21351
-rw-r--r--active/CVE-2004-21361
-rw-r--r--active/CVE-2004-26601
-rw-r--r--active/CVE-2005-01091
-rw-r--r--active/CVE-2005-05041
-rw-r--r--active/CVE-2005-09771
-rw-r--r--active/CVE-2005-12641
-rw-r--r--active/CVE-2005-12651
-rw-r--r--active/CVE-2005-28731
-rw-r--r--active/CVE-2005-30441
-rw-r--r--active/CVE-2005-31051
-rw-r--r--active/CVE-2005-35271
-rw-r--r--active/CVE-2005-36601
-rw-r--r--active/CVE-2005-44401
-rw-r--r--active/CVE-2005-44411
-rw-r--r--active/CVE-2005-47981
-rw-r--r--active/CVE-2006-10521
-rw-r--r--active/CVE-2006-13431
-rw-r--r--active/CVE-2006-15281
-rw-r--r--active/CVE-2006-18551
-rw-r--r--active/CVE-2006-18561
-rw-r--r--active/CVE-2006-18621
-rw-r--r--active/CVE-2006-22751
-rw-r--r--active/CVE-2006-24441
-rw-r--r--active/CVE-2006-24451
-rw-r--r--active/CVE-2006-24461
-rw-r--r--active/CVE-2006-24481
-rw-r--r--active/CVE-2006-26291
-rw-r--r--active/CVE-2006-29341
-rw-r--r--active/CVE-2006-29351
-rw-r--r--active/CVE-2006-29361
-rw-r--r--active/CVE-2006-34681
-rw-r--r--active/CVE-2006-36341
-rw-r--r--active/CVE-2006-37451
-rw-r--r--active/CVE-2006-40931
-rw-r--r--active/CVE-2006-41451
-rw-r--r--active/CVE-2006-45351
-rw-r--r--active/CVE-2006-45381
-rw-r--r--active/block-all-signals-race1
43 files changed, 0 insertions, 43 deletions
diff --git a/active/00boilerplate b/active/00boilerplate
index 7df9f9aa..55a4773f 100644
--- a/active/00boilerplate
+++ b/active/00boilerplate
@@ -5,7 +5,6 @@ Ubuntu-Description:
Notes:
Bugs:
upstream:
-linux-2.6.16:
linux-2.6:
2.6.8-sarge-security:
2.4.27-sarge-security:
diff --git a/active/CVE-2002-0704 b/active/CVE-2002-0704
index bc5374e0..f9e58a26 100644
--- a/active/CVE-2002-0704
+++ b/active/CVE-2002-0704
@@ -41,7 +41,6 @@ Notes:
horms> problem on allong with upstream's 2.4 (~2.4.33-pre1)
Bugs:
upstream: released (2.6.11)
-linux-2.6.16: N/A
linux-2.6: N/A
2.6.8-sarge-security: ignored (2.6.8-16sarge5)
2.4.27-sarge-security: ignored (2.4.27-10sarge5)
diff --git a/active/CVE-2004-0813 b/active/CVE-2004-0813
index 6409c575..3ae19f15 100644
--- a/active/CVE-2004-0813
+++ b/active/CVE-2004-0813
@@ -21,7 +21,6 @@ Notes:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133098
Bugs:
upstream: fixed (2.6.10)
-linux-2.6.16: N/A
linux-2.6: N/A
2.6.8-sarge-security: released (2.6.8-14)
2.4.27-sarge-security: ignored (2.4.27-10sarge3)
diff --git a/active/CVE-2004-1190 b/active/CVE-2004-1190
index ec15150c..185fe2f9 100644
--- a/active/CVE-2004-1190
+++ b/active/CVE-2004-1190
@@ -13,7 +13,6 @@ Description:
Notes:
Bugs: 300162
upstream: released (2.6.10)
-linux-2.6.16: N/A
linux-2.6: N/A
2.6.8-sarge-security: released (2.6.8-14) [scsi-ioctl-cmd-warned.dpatch, scsi-ioctl-remove-dup.dpatch, scsi-ioctl-permit.dpatch, SG_IO-cap.dpatch, SG_IO-safe-commands-2.dpatch, SG_IO-safe-commands-3.dpatch, SG_IO-safe-commands-5.dpatch]
2.4.27-sarge-security: ignored (2.4.27-10sarge3)
diff --git a/active/CVE-2004-2135 b/active/CVE-2004-2135
index 31e2ff33..c922844b 100644
--- a/active/CVE-2004-2135
+++ b/active/CVE-2004-2135
@@ -17,7 +17,6 @@ Notes:
jmm> I'm marking all these N/A
Bugs:
upstream:
-linux-2.6.16: ignored (2.6.16-18)
linux-2.6:
2.6.8-sarge-security: ignored (2.6.8-16sarge5)
2.4.27-sarge-security: N/A
diff --git a/active/CVE-2004-2136 b/active/CVE-2004-2136
index ce29d88b..de2c8476 100644
--- a/active/CVE-2004-2136
+++ b/active/CVE-2004-2136
@@ -13,7 +13,6 @@ Notes:
jmm> 2.4 doesn't have dm-crypt, though
Bugs:
upstream:
-linux-2.6.16: ignored (2.6.16-18)
linux-2.6:
2.6.8-sarge-security: ignored (2.6.8-16sarge5)
2.4.27-sarge-security: N/A
diff --git a/active/CVE-2004-2660 b/active/CVE-2004-2660
index ce902436..c6e6b140 100644
--- a/active/CVE-2004-2660
+++ b/active/CVE-2004-2660
@@ -11,7 +11,6 @@ Notes:
jmm> Vulnerable code not present in 2.4
Bugs:
upstream: released (2.6.10)
-linux-2.6.16: N/A
linux-2.6: N/A
2.6.8-sarge-security: pending (2.6.8-16sarge5) [direct-io-write-mem-leak.dpatch]
2.4.27-sarge-security: N/A
diff --git a/active/CVE-2005-0109 b/active/CVE-2005-0109
index 58ec95d9..87b79d60 100644
--- a/active/CVE-2005-0109
+++ b/active/CVE-2005-0109
@@ -44,7 +44,6 @@ Notes:
jmm> What did other distributions like Red Hat, SuSE or OWL do?
Bugs:
upstream:
-linux-2.6.16: ignored (2.6.16-18)
linux-2.6:
2.6.8-sarge-security: ignored (2.6.8-16sarge5)
2.4.27-sarge-security: ignored (2.4.27-10sarge5)
diff --git a/active/CVE-2005-0504 b/active/CVE-2005-0504
index a83d6349..5432f88f 100644
--- a/active/CVE-2005-0504
+++ b/active/CVE-2005-0504
@@ -8,7 +8,6 @@ Notes:
dannf> still not upstream as of 2.6.18-rc4, i've poked upstream about it
Bugs:
upstream:
-linux-2.6.16:
linux-2.6:
2.6.8-sarge-security: released (2.6.8-12) [030-moxa_user_copy_checking.dpatch]
2.4.27-sarge-security: released (2.4.27-8) [125_moxa_bound_checking.diff]
diff --git a/active/CVE-2005-0977 b/active/CVE-2005-0977
index 9afd613c..c4122a70 100644
--- a/active/CVE-2005-0977
+++ b/active/CVE-2005-0977
@@ -14,7 +14,6 @@ Notes:
aren't in 2.4, so the port isn't trivial for me.
Bugs: 303177
upstream: released (2.6.11)
-linux-2.6.16: N/A
linux-2.6: N/A
2.6.8-sarge-security: released (2.6.8-16) [mm-shmem-truncate.dpatch]
2.4.27-sarge-security: ignored (2.4.27-10sarge3)
diff --git a/active/CVE-2005-1264 b/active/CVE-2005-1264
index 775006c9..0f1843c6 100644
--- a/active/CVE-2005-1264
+++ b/active/CVE-2005-1264
@@ -18,7 +18,6 @@ Notes:
dannf> Code is very different in 2.4, don't know if its vulnerable
Bugs:
upstream: released (2.6.11.10)
-linux-2.6.16:
linux-2.6: N/A
2.6.8-sarge-security: released (2.6.8-16) [drivers-block-raw-ioctl.dpatch]
2.4.27-sarge-security: ignored (2.4.27-10sarge3)
diff --git a/active/CVE-2005-1265 b/active/CVE-2005-1265
index 3528cd38..9f227b51 100644
--- a/active/CVE-2005-1265
+++ b/active/CVE-2005-1265
@@ -9,7 +9,6 @@ Notes:
dannf> Code is very different in 2.4; dunno if its vulnerable
Bugs:
upstream: released (2.6.12)
-linux-2.6.16: N/A
linux-2.6: N/A
2.6.8-sarge-security: released (2.6.8-16sarge1) [mm-mmap-range-test.dpatch]
2.4.27-sarge-security: ignored (2.4.27-10sarge4)
diff --git a/active/CVE-2005-2873 b/active/CVE-2005-2873
index b05a2e0d..58005bbe 100644
--- a/active/CVE-2005-2873
+++ b/active/CVE-2005-2873
@@ -20,7 +20,6 @@ Notes:
jmm> There's now a complete rewrite by Patrick McHardy in 2.6.18
upstream: released (2.6.18)
Bugs: 332381, 332231, 332228
-linux-2.6.16: ignored (2.6.16-18)
linux-2.6: needed
2.6.8-sarge-security: ignored (2.6.8-16sarge5)
2.4.27-sarge-security: ignored (2.4.27-10sarge4)
diff --git a/active/CVE-2005-3044 b/active/CVE-2005-3044
index a9b812dd..08adeab9 100644
--- a/active/CVE-2005-3044
+++ b/active/CVE-2005-3044
@@ -23,7 +23,6 @@ Notes:
micah> have two patches... if you look at them they look REALLY similar, but they aren't
micah> dont be fooled
upstream: released (2.6.13.2)
-linux-2.6.16: N/A
linux-2.6: released (2.6.12-7, 2.6.13-1) [lost-fput-in-32bit-ioctl-on-x86-64.patch, linux-2.6.13.2.patch]
2.6.8-sarge-security: released (2.6.8-16sarge2) [lost-fput-in-32bit-ioctl-on-x86-64.dpatch, lost-sockfd_put-in-32bit-compat-routing_ioctl.patch]
2.4.27-sarge-security: ignored (2.4.27-10sarge4)
diff --git a/active/CVE-2005-3105 b/active/CVE-2005-3105
index ec97405d..24ada934 100644
--- a/active/CVE-2005-3105
+++ b/active/CVE-2005-3105
@@ -28,5 +28,4 @@ Bugs: 332569
upstream: 2.6.12
2.6.8-sarge-security: released (2.6.8-16sarge1) [mckinley_icache.dpatch]
2.4.27-sarge-security: ignored (2.4.27-10sarge3)
-linux-2.6.16: N/A
linux-2.6: N/A
diff --git a/active/CVE-2005-3527 b/active/CVE-2005-3527
index 5f3f574f..73b09695 100644
--- a/active/CVE-2005-3527
+++ b/active/CVE-2005-3527
@@ -27,7 +27,6 @@ Notes:
backporting is too hard for the same reasons as 2.6.8.
Bugs:
upstream: released (2.6.14)
-linux-2.6.16: N/A
linux-2.6: N/A
2.6.8-sarge-security: ignored (2.6.8-16sarge5)
2.4.27-sarge-security: ignored (2.4.27-10sarge5)
diff --git a/active/CVE-2005-3660 b/active/CVE-2005-3660
index 82c12870..d6ce355e 100644
--- a/active/CVE-2005-3660
+++ b/active/CVE-2005-3660
@@ -14,7 +14,6 @@ Notes:
dannf> to struct file. No such thing has gone upstream yet, however.
Bugs:
upstream:
-linux-2.6.16: ignored (2.6.16-18)
linux-2.6:
2.6.8-sarge-security: ignored (2.6.8-16sarge5)
2.4.27-sarge-security: ignored (2.4.27-10sarge4)
diff --git a/active/CVE-2005-4440 b/active/CVE-2005-4440
index ccbe26b8..510f9fa9 100644
--- a/active/CVE-2005-4440
+++ b/active/CVE-2005-4440
@@ -34,7 +34,6 @@ Notes:
dannf> series of kernels & follow what upstream does.
Bugs:
upstream:
-linux-2.6.16: ignored (2.6.16-18)
linux-2.6:
2.6.8-sarge-security: ignored (2.6.8-16sarge5)
2.4.27-sarge-security: ignored (2.4.27-10sarge4)
diff --git a/active/CVE-2005-4441 b/active/CVE-2005-4441
index 79e66a29..eda7c45a 100644
--- a/active/CVE-2005-4441
+++ b/active/CVE-2005-4441
@@ -38,7 +38,6 @@ Notes:
dannf> series of kernels & follow what upstream does.
Bugs:
upstream:
-linux-2.6.16: ignored (2.6.16-18)
linux-2.6:
2.6.8-sarge-security: ignored (2.6.8-16sarge5)
2.4.27-sarge-security: ignored (2.4.27-10sarge4)
diff --git a/active/CVE-2005-4798 b/active/CVE-2005-4798
index 3d441009..212b2085 100644
--- a/active/CVE-2005-4798
+++ b/active/CVE-2005-4798
@@ -14,7 +14,6 @@ Notes:
dannf> 2.6.8 looks affected to me - including my shot at a fix...
Bugs:
upstream:
-linux-2.6.16: N/A
linux-2.6: N/A
2.6.8-sarge-security: pending (2.6.8-16sarge5) [nfs-handle-long-symlinks.dpatch]
2.4.27-sarge-security: pending (2.4.27-10sarge4) [223_nfs-handle-long-symlinks.diff]
diff --git a/active/CVE-2006-1052 b/active/CVE-2006-1052
index 8ed98423..4f50403d 100644
--- a/active/CVE-2006-1052
+++ b/active/CVE-2006-1052
@@ -10,7 +10,6 @@ Description:
Notes:
Bugs:
upstream: released (2.6.16)
-linux-2.6.16: released (2.6.16-1)
linux-2.6: released (2.6.16-1)
2.6.8-sarge-security: pending (2.6.8-16sarge5) [selinux-tracer-SID-fix.dpatch]
2.4.27-sarge-security: N/A
diff --git a/active/CVE-2006-1343 b/active/CVE-2006-1343
index e3d417e1..609fabdf 100644
--- a/active/CVE-2006-1343
+++ b/active/CVE-2006-1343
@@ -13,7 +13,6 @@ Notes:
jmm> It's now fixed upstream in 2.6 as well, let's include it in sarge4
Bugs:
upstream: released (2.4.33-pre3), released (2.6.16.19)
-linux-2.6.16: released (2.6.16-15)
linux-2.6: released (2.6.16-15)
2.6.8-sarge-security: pending (2.6.8-16sarge5) [netfilter-SO_ORIGINAL_DST-leak.dpatch]
2.4.27-sarge-security: released (2.4.27-10sarge3) [212_ipv4-sin_zero_clear.diff]
diff --git a/active/CVE-2006-1528 b/active/CVE-2006-1528
index d37f164b..bdeb2c52 100644
--- a/active/CVE-2006-1528
+++ b/active/CVE-2006-1528
@@ -9,7 +9,6 @@ Description:
Notes:
Bugs:
upstream: released (2.6.13), released (2.4.33.1)
-linux-2.6.16: N/A
linux-2.6: released (2.6.13-1)
2.6.8-sarge-security: pending (2.6.8-16sarge5)
2.4.27-sarge-security: pending (2.4.27-10sarge4)
diff --git a/active/CVE-2006-1855 b/active/CVE-2006-1855
index 5d65625d..2e41f2f2 100644
--- a/active/CVE-2006-1855
+++ b/active/CVE-2006-1855
@@ -11,7 +11,6 @@ Notes:
jmm> Vulnerable code not present in 2.4.27
Bugs:
upstream: released (2.6.11.12)
-linux-2.6.16: N/A
linux-2.6: N/A
2.6.8-sarge-security: pending (2.6.8-16sarge5)
2.4.27-sarge-security: N/A
diff --git a/active/CVE-2006-1856 b/active/CVE-2006-1856
index db4a75c1..8ce68c0f 100644
--- a/active/CVE-2006-1856
+++ b/active/CVE-2006-1856
@@ -11,7 +11,6 @@ Description:
Notes:
Bugs:
upstream: released (2.6.17)
-linux-2.6.16: needed
linux-2.6: released (2.6.17-1)
2.6.8-sarge-security: pending (2.6.8-16sarge5)
2.4.27-sarge-security: N/A
diff --git a/active/CVE-2006-1862 b/active/CVE-2006-1862
index f17cb8f2..0820dbc6 100644
--- a/active/CVE-2006-1862
+++ b/active/CVE-2006-1862
@@ -12,7 +12,6 @@ Notes:
dannf> https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189031
Bugs:
upstream:
-linux-2.6.16: N/A
linux-2.6: N/A
2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
diff --git a/active/CVE-2006-2275 b/active/CVE-2006-2275
index 0deb9ce9..4fb30aee 100644
--- a/active/CVE-2006-2275
+++ b/active/CVE-2006-2275
@@ -12,7 +12,6 @@ Notes:
jmm> be postponed for now
Bugs:
upstream: released (2.6.16.15)
-linux-2.6.16: released (2.6.16-13)
linux-2.6: released (2.6.16-13)
2.6.8-sarge-security: ignored (2.6.8-16sarge4)
2.4.27-sarge-security: ignored (2.4.27-10sarge4)
diff --git a/active/CVE-2006-2444 b/active/CVE-2006-2444
index 5ac7af2f..24524810 100644
--- a/active/CVE-2006-2444
+++ b/active/CVE-2006-2444
@@ -12,7 +12,6 @@ Description:
Notes:
Bugs:
upstream: released (2.6.16.18)
-linux-2.6.16: released (2.6.16-15)
linux-2.6: released (2.6.16-15)
2.6.8-sarge-security: pending (2.6.8-16sarge5) [snmp-nat-mem-corruption-fix.dpatch]
2.4.27-sarge-security: pending (2.4.27-10sarge4) [226_snmp-nat-mem-corruption-fix.diff]
diff --git a/active/CVE-2006-2445 b/active/CVE-2006-2445
index 90d6871c..4116085a 100644
--- a/active/CVE-2006-2445
+++ b/active/CVE-2006-2445
@@ -16,7 +16,6 @@ Notes:
mpitt> 2.6.10-hoary does not need 4th GIT patch, function does not exist
Bugs:
upstream: released (2.6.16.21)
-linux-2.6.16: released (2.6.16-15)
linux-2.6: released (2.6.16-15)
2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
diff --git a/active/CVE-2006-2446 b/active/CVE-2006-2446
index 5e965b8b..d6d67ef3 100644
--- a/active/CVE-2006-2446
+++ b/active/CVE-2006-2446
@@ -15,7 +15,6 @@ Ubuntu-Description:
Notes:
Bugs:
upstream:
-linux-2.6.16:
linux-2.6:
2.6.8-sarge-security: pending (2.6.8-16sarge5) [kfree_skb-race.dpatch]
2.4.27-sarge-security: pending (2.4.27-10sarge4) [227_kfree_skb.diff]
diff --git a/active/CVE-2006-2448 b/active/CVE-2006-2448
index d976bb03..e3b4ee58 100644
--- a/active/CVE-2006-2448
+++ b/active/CVE-2006-2448
@@ -12,7 +12,6 @@ Notes:
if this fix is needed or how to apply it.
Bugs:
upstream: released (2.6.16.21)
-linux-2.6.16: released (2.6.16-15)
linux-2.6: released (2.6.16-15)
2.6.8-sarge-security: ignored (2.6.8-16sarge5)
2.4.27-sarge-security: ignored (2.4.27-10sarge4)
diff --git a/active/CVE-2006-2629 b/active/CVE-2006-2629
index 8bdc59b6..3e88739f 100644
--- a/active/CVE-2006-2629
+++ b/active/CVE-2006-2629
@@ -12,7 +12,6 @@ Notes:
dannf> marking sarge kernels N/A because they are < 2.6.15
Bugs:
upstream:
-linux-2.6.16:
linux-2.6:
2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
diff --git a/active/CVE-2006-2934 b/active/CVE-2006-2934
index 9a57f379..16adb8df 100644
--- a/active/CVE-2006-2934
+++ b/active/CVE-2006-2934
@@ -15,7 +15,6 @@ Notes:
netfilter/sctp didn't exist in 2.6.8/2.4.27
Bugs:
upstream: released (2.6.16.23, 2.6.17.3)
-linux-2.6.16: released (2.6.16-17)
linux-2.6: released (2.6.17-3)
2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
diff --git a/active/CVE-2006-2935 b/active/CVE-2006-2935
index 9d135dce..872c9717 100644
--- a/active/CVE-2006-2935
+++ b/active/CVE-2006-2935
@@ -16,7 +16,6 @@ Notes:
dannf> Submitted to Adrian Bunk for inclusion in 2.6.16.y
Bugs:
upstream: released (2.6.17.7)
-linux-2.6.16: pending (2.6.16-18) [cdrom-bad-cgc.buflen-assign.patch]
linux-2.6: released (2.6.17-5)
2.6.8-sarge-security: pending (2.6.8-16sarge5) [cdrom-bad-cgc.buflen-assign.dpatch]
2.4.27-sarge-security: pending (2.4.27-10sarge4) [224_cdrom-bad-cgc.buflen-assign.diff]
diff --git a/active/CVE-2006-2936 b/active/CVE-2006-2936
index 2792608d..7207499b 100644
--- a/active/CVE-2006-2936
+++ b/active/CVE-2006-2936
@@ -15,7 +15,6 @@ Notes:
jmm> 2.4 not affected due to different memory allocation
Bugs:
upstream: released (2.6.16.26, 2.6.17.7)
-linux-2.6.16: pending (2.6.16-18)
linux-2.6: released (2.6.17-5)
2.6.8-sarge-security: pending (2.6.8-16sarge5)
2.4.27-sarge-security: N/A
diff --git a/active/CVE-2006-3468 b/active/CVE-2006-3468
index 368a160d..c9002cdc 100644
--- a/active/CVE-2006-3468
+++ b/active/CVE-2006-3468
@@ -20,7 +20,6 @@ Notes:
Bugs:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=199172
upstream: released (2.6.17.8, 2.6.18-rc4)
-linux-2.6.16: pending (2.6.16-18) [fs-ext3-bad-nfs-handle.patch]
linux-2.6: needed
2.6.8-sarge-security: pending (2.6.8-16sarge5) [fs-ext3-bad-nfs-handle.dpatch]
2.4.27-sarge-security: ignored (2.4.27-10sarge4)
diff --git a/active/CVE-2006-3634 b/active/CVE-2006-3634
index ec45d959..6038ddbe 100644
--- a/active/CVE-2006-3634
+++ b/active/CVE-2006-3634
@@ -12,7 +12,6 @@ Notes:
dannf> s390 didn't have a futex.h until after 2.6.16
Bugs:
upstream: released (2.6.18-rc2)
-linux-2.6.16: N/A
linux-2.6: released (2.6.17-1)
2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
diff --git a/active/CVE-2006-3745 b/active/CVE-2006-3745
index 9ca74c4d..33db41c7 100644
--- a/active/CVE-2006-3745
+++ b/active/CVE-2006-3745
@@ -11,7 +11,6 @@ Ubuntu-Description:
Notes:
Bugs:
upstream: released (2.6.18-rc5)
-linux-2.6.16: needed
linux-2.6: released (2.6.17-7)
2.6.8-sarge-security: pending (2.6.8-16sarge5) [sctp-priv-elevation.dpatch, sctp-priv-elevation-2.dpatch]
2.4.27-sarge-security: pending (2.4.27-10sarge4) [228_sctp-priv-elevation.diff, 228_sctp-priv-elevation-2.diff]
diff --git a/active/CVE-2006-4093 b/active/CVE-2006-4093
index 472324ed..b29060d1 100644
--- a/active/CVE-2006-4093
+++ b/active/CVE-2006-4093
@@ -10,7 +10,6 @@ Ubuntu-Description:
Notes:
Bugs:
upstream: released (2.4.33.1), released (2.6.17.9), released (2.6.18-rc5)
-linux-2.6.16: needed
linux-2.6: needed
2.6.8-sarge-security: pending (2.6.8-16sarge5) [ppc-hid0-dos.dpatch]
2.4.27-sarge-security: needed
diff --git a/active/CVE-2006-4145 b/active/CVE-2006-4145
index 83294056..d2a7ecfc 100644
--- a/active/CVE-2006-4145
+++ b/active/CVE-2006-4145
@@ -11,7 +11,6 @@ Notes:
dannf> Submitted upstream on 2006.08.27
Bugs:
upstream: released (2.6.17.10), released (2.6.18-rc5)
-linux-2.6.16: needed
linux-2.6: released (2.6.17-7)
2.6.8-sarge-security: pending (2.6.8-16sarge5)
2.4.27-sarge-security: pending (2.4.27-10sarge4)
diff --git a/active/CVE-2006-4535 b/active/CVE-2006-4535
index fb2c0ba3..7381886a 100644
--- a/active/CVE-2006-4535
+++ b/active/CVE-2006-4535
@@ -11,7 +11,6 @@ Ubuntu-Description:
Notes:
Bugs:
upstream: released (2.6.18-rc6)
-linux-2.6.16: needed
linux-2.6: released (2.6.18-1)
2.6.8-sarge-security: pending (2.6.8-16sarge5)
2.4.27-sarge-security: pending (2.4.27-10sarge4)
diff --git a/active/CVE-2006-4538 b/active/CVE-2006-4538
index 9dde14db..0ec3b902 100644
--- a/active/CVE-2006-4538
+++ b/active/CVE-2006-4538
@@ -15,7 +15,6 @@ Ubuntu-Description:
Notes:
Bugs:
upstream:
-linux-2.6.16:
linux-2.6:
2.6.8-sarge-security:
2.4.27-sarge-security:
diff --git a/active/block-all-signals-race b/active/block-all-signals-race
index cef99ae2..a70c1646 100644
--- a/active/block-all-signals-race
+++ b/active/block-all-signals-race
@@ -10,7 +10,6 @@ Description:
Notes:
Bugs:
upstream:
-linux-2.6.16:
linux-2.6: pending (2.6.15.5)
2.6.8-sarge-security:
2.4.27-sarge-security:

© 2014-2024 Faster IT GmbH | imprint | privacy policy