[kernel-sec-discuss] r669 - active
Dann Frazier
dannf at alioth.debian.org
Wed Dec 20 23:06:12 CET 2006
Author: dannf
Date: 2006-12-20 23:06:12 +0100 (Wed, 20 Dec 2006)
New Revision: 669
Modified:
active/CVE-2006-4623
Log:
update sarge status
Modified: active/CVE-2006-4623
===================================================================
--- active/CVE-2006-4623 2006-12-18 00:26:37 UTC (rev 668)
+++ active/CVE-2006-4623 2006-12-20 22:06:12 UTC (rev 669)
@@ -11,10 +11,18 @@
mpitt> Questionable -- rather than fixing the kernel to not send out
invalid ULE packets, it should be fixed to not crash upon
receiving one.
+ dannf> I noticed that a different, and much larger patch went into 2.6.18
+ that conflicts with the one provided by the original reporter (which
+ went into 2.6.17.y). I asked the original reporter if that patch also
+ fixed the issue. Ang Way replied:
+ "Yes, it is fixed in 2.6.18 and later even though the patch is
+ different. Their fix is more elegant."
+ So, marking etch N/A
Bugs:
-upstream: needed
-linux-2.6:
-2.6.8-sarge-security: ignored (2.6.8-16sarge6)
+upstream: released (2.6.18)
+linux-2.6: released (2.6.18-1)
+2.6.18-etch-security: N/A
+2.6.8-sarge-security: pending (2.6.8-16sarge7) [dvb-core-handle-0-length-ule-sndu.dpatch]
2.4.27-sarge-security: N/A
2.6.10-hoary-security:
2.6.12-breezy-security:
More information about the kernel-sec-discuss
mailing list