[kernel] r5629 - patch-tracking
Dann Frazier
dannf at costa.debian.org
Mon Jan 30 01:10:44 UTC 2006
Author: dannf
Date: Mon Jan 30 01:10:43 2006
New Revision: 5629
Modified:
patch-tracking/CVE-2005-0532
Log:
2.4 isn't vulnerable
Modified: patch-tracking/CVE-2005-0532
==============================================================================
--- patch-tracking/CVE-2005-0532 (original)
+++ patch-tracking/CVE-2005-0532 Mon Jan 30 01:10:43 2006
@@ -14,15 +14,16 @@
architectures, may allow local users to trigger a buffer overflow as a result
of casting discrepancies between size_t and int data types.
Notes:
+ dannf> Vulnerable code didn't exist in 2.4
Bugs:
-upstream:
-linux-2.6:
+upstream: released (2.6.11-rc3)
+linux-2.6: N/A
2.6.8-sarge-security: released (2.6.8-14) [117-reiserfs_file_64bit_size_t_fixes.dpatch]
-2.4.27-sarge-security:
-2.4.19-woody-security:
-2.4.18-woody-security:
-2.4.17-woody-security:
-2.4.16-woody-security:
-2.4.17-woody-security-hppa:
-2.4.17-woody-security-ia64:
-2.4.18-woody-security-hppa:
+2.4.27-sarge-security: N/A
+2.4.19-woody-security: N/A
+2.4.18-woody-security: N/A
+2.4.17-woody-security: N/A
+2.4.16-woody-security: N/A
+2.4.17-woody-security-hppa: N/A
+2.4.17-woody-security-ia64: N/A
+2.4.18-woody-security-hppa: N/A
More information about the Kernel-svn-changes
mailing list