[kernel-sec-discuss] r719 - active
Dann Frazier
dannf at alioth.debian.org
Tue Mar 20 08:32:59 CET 2007
Author: dannf
Date: 2007-03-20 07:32:58 +0000 (Tue, 20 Mar 2007)
New Revision: 719
Modified:
active/CVE-2006-5823
Log:
update debian status
Modified: active/CVE-2006-5823
===================================================================
--- active/CVE-2006-5823 2007-03-20 07:10:56 UTC (rev 718)
+++ active/CVE-2006-5823 2007-03-20 07:32:58 UTC (rev 719)
@@ -14,12 +14,13 @@
uses zlib compression (such as cramfs), this could be exploited to
crash the kernel.
Notes:
+ dannf> This is reproducible in 2.4.27
Bugs:
-upstream:
+upstream: released (2.6.20-rc1)
linux-2.6:
-2.6.18-etch-security: needed
+2.6.18-etch-security: released (2.6.18.dfsg.1-10)
2.6.8-sarge-security: needed
-2.4.27-sarge-security:
+2.4.27-sarge-security: needed
2.6.12-breezy-security: released (2.6.12-10.43)
2.6.15-dapper-security: released (2.6.15-28.51)
2.6.17-edgy-security: released (2.6.17.1-11.35)
More information about the kernel-sec-discuss
mailing list