[kernel] r5488 - patch-tracking

Dann Frazier dannf at costa.debian.org
Tue Jan 17 04:01:43 UTC 2006


Author: dannf
Date: Tue Jan 17 04:01:42 2006
New Revision: 5488

Modified:
   patch-tracking/CVE-2004-1151
Log:
<= 2.4.27 doesn't look vulnerable, and we don't have 2.4/x86_64 anyway.

Modified: patch-tracking/CVE-2004-1151
==============================================================================
--- patch-tracking/CVE-2004-1151	(original)
+++ patch-tracking/CVE-2004-1151	Tue Jan 17 04:01:42 2006
@@ -13,15 +13,16 @@
  sys32_vm86_warning functions in sys_ia32.c for Linux 2.6.x may allow local
  attackers to modify kernel memory and gain privileges.
 Notes: 
+ <= 2.4.27 doesn't look vulnerable, and we don't have 2.4/x86_64 anyway.
 Bugs: 
-upstream: 
-linux-2.6: 
+upstream: released (2.6.10)
+linux-2.6: N/A
 2.6.8-sarge-security: released (2.6.8-11) [arch-x86_64-sys32_ni-overflow.dpatch]
-2.4.27-sarge-security: 
-2.4.19-woody-security: 
-2.4.18-woody-security: 
-2.4.17-woody-security: 
-2.4.16-woody-security: 
-2.4.17-woody-security-hppa: 
-2.4.17-woody-security-ia64: 
-2.4.18-woody-security-hppa: 
+2.4.27-sarge-security: N/A
+2.4.19-woody-security: N/A
+2.4.18-woody-security: N/A
+2.4.17-woody-security: N/A
+2.4.16-woody-security: N/A
+2.4.17-woody-security-hppa: N/A
+2.4.17-woody-security-ia64: N/A
+2.4.18-woody-security-hppa: N/A



More information about the Kernel-svn-changes mailing list