[kernel-sec-discuss] r719 - active

Dann Frazier dannf at alioth.debian.org
Tue Mar 20 08:32:59 CET 2007


Author: dannf
Date: 2007-03-20 07:32:58 +0000 (Tue, 20 Mar 2007)
New Revision: 719

Modified:
   active/CVE-2006-5823
Log:
update debian status

Modified: active/CVE-2006-5823
===================================================================
--- active/CVE-2006-5823	2007-03-20 07:10:56 UTC (rev 718)
+++ active/CVE-2006-5823	2007-03-20 07:32:58 UTC (rev 719)
@@ -14,12 +14,13 @@
  uses zlib compression (such as cramfs), this could be exploited to
  crash the kernel.
 Notes: 
+ dannf> This is reproducible in 2.4.27
 Bugs: 
-upstream: 
+upstream: released (2.6.20-rc1)
 linux-2.6: 
-2.6.18-etch-security: needed
+2.6.18-etch-security: released (2.6.18.dfsg.1-10)
 2.6.8-sarge-security: needed
-2.4.27-sarge-security: 
+2.4.27-sarge-security: needed
 2.6.12-breezy-security: released (2.6.12-10.43)
 2.6.15-dapper-security: released (2.6.15-28.51)
 2.6.17-edgy-security: released (2.6.17.1-11.35)




More information about the kernel-sec-discuss mailing list