[kernel-sec-discuss] r726 - active

Dann Frazier dannf at alioth.debian.org
Sat Mar 31 21:58:27 UTC 2007


Author: dannf
Date: 2007-03-31 21:58:27 +0000 (Sat, 31 Mar 2007)
New Revision: 726

Modified:
   active/CVE-2006-6053
Log:
update sarge status

Modified: active/CVE-2006-6053
===================================================================
--- active/CVE-2006-6053	2007-03-31 21:58:07 UTC (rev 725)
+++ active/CVE-2006-6053	2007-03-31 21:58:27 UTC (rev 726)
@@ -10,12 +10,13 @@
  structures. By mounting a specially crafted ext3 file system, a local
  attacker could exploit this to crash the kernel.
 Notes: 
+ dannf> only the dir.c bit applies to 2.4
 Bugs: 
 upstream: released (2.6.20-rc5)
-linux-2.6: 
-2.6.18-etch-security: needed
-2.6.8-sarge-security: needed
-2.4.27-sarge-security: 
+linux-2.6: released (2.6.20-1)
+2.6.18-etch-security: released (2.6.18.dfsg.1-10) [bugfix/2.6.16.38]
+2.6.8-sarge-security: pending (2.6.8-16sarge7) [ext3-fsfuzz.dpatch]
+2.4.27-sarge-security: pending (2.4.27-10sarge6) [242_ext3-fsfuzz.diff]
 2.6.12-breezy-security: released (2.6.12-10.43)
 2.6.15-dapper-security: released (2.6.15-28.51)
 2.6.17-edgy-security: released (2.6.17.1-11.35)




More information about the kernel-sec-discuss mailing list