[kernel-sec-discuss] r669 - active

Dann Frazier dannf at alioth.debian.org
Wed Dec 20 23:06:12 CET 2006


Author: dannf
Date: 2006-12-20 23:06:12 +0100 (Wed, 20 Dec 2006)
New Revision: 669

Modified:
   active/CVE-2006-4623
Log:
update sarge status

Modified: active/CVE-2006-4623
===================================================================
--- active/CVE-2006-4623	2006-12-18 00:26:37 UTC (rev 668)
+++ active/CVE-2006-4623	2006-12-20 22:06:12 UTC (rev 669)
@@ -11,10 +11,18 @@
  mpitt> Questionable -- rather than fixing the kernel to not send out
 	invalid ULE packets, it should be fixed to not crash upon
 	receiving one.
+ dannf> I noticed that a different, and much larger patch went into 2.6.18
+        that conflicts with the one provided by the original reporter (which
+        went into 2.6.17.y). I asked the original reporter if that patch also
+        fixed the issue. Ang Way replied:
+          "Yes, it is fixed in 2.6.18 and later even though the patch is
+           different. Their fix is more elegant."
+        So, marking etch N/A
 Bugs: 
-upstream: needed
-linux-2.6:
-2.6.8-sarge-security: ignored (2.6.8-16sarge6)
+upstream: released (2.6.18)
+linux-2.6: released (2.6.18-1)
+2.6.18-etch-security: N/A
+2.6.8-sarge-security: pending (2.6.8-16sarge7) [dvb-core-handle-0-length-ule-sndu.dpatch]
 2.4.27-sarge-security: N/A
 2.6.10-hoary-security:
 2.6.12-breezy-security:




More information about the kernel-sec-discuss mailing list