[kernel-sec-discuss] r726 - active
Dann Frazier
dannf at alioth.debian.org
Sat Mar 31 21:58:27 UTC 2007
Author: dannf
Date: 2007-03-31 21:58:27 +0000 (Sat, 31 Mar 2007)
New Revision: 726
Modified:
active/CVE-2006-6053
Log:
update sarge status
Modified: active/CVE-2006-6053
===================================================================
--- active/CVE-2006-6053 2007-03-31 21:58:07 UTC (rev 725)
+++ active/CVE-2006-6053 2007-03-31 21:58:27 UTC (rev 726)
@@ -10,12 +10,13 @@
structures. By mounting a specially crafted ext3 file system, a local
attacker could exploit this to crash the kernel.
Notes:
+ dannf> only the dir.c bit applies to 2.4
Bugs:
upstream: released (2.6.20-rc5)
-linux-2.6:
-2.6.18-etch-security: needed
-2.6.8-sarge-security: needed
-2.4.27-sarge-security:
+linux-2.6: released (2.6.20-1)
+2.6.18-etch-security: released (2.6.18.dfsg.1-10) [bugfix/2.6.16.38]
+2.6.8-sarge-security: pending (2.6.8-16sarge7) [ext3-fsfuzz.dpatch]
+2.4.27-sarge-security: pending (2.4.27-10sarge6) [242_ext3-fsfuzz.diff]
2.6.12-breezy-security: released (2.6.12-10.43)
2.6.15-dapper-security: released (2.6.15-28.51)
2.6.17-edgy-security: released (2.6.17.1-11.35)
More information about the kernel-sec-discuss
mailing list