[kernel] r5629 - patch-tracking

Dann Frazier dannf at costa.debian.org
Mon Jan 30 01:10:44 UTC 2006


Author: dannf
Date: Mon Jan 30 01:10:43 2006
New Revision: 5629

Modified:
   patch-tracking/CVE-2005-0532
Log:
2.4 isn't vulnerable


Modified: patch-tracking/CVE-2005-0532
==============================================================================
--- patch-tracking/CVE-2005-0532	(original)
+++ patch-tracking/CVE-2005-0532	Mon Jan 30 01:10:43 2006
@@ -14,15 +14,16 @@
  architectures, may allow local users to trigger a buffer overflow as a result
  of casting discrepancies between size_t and int data types.
 Notes: 
+ dannf> Vulnerable code didn't exist in 2.4
 Bugs: 
-upstream: 
-linux-2.6: 
+upstream: released (2.6.11-rc3)
+linux-2.6: N/A
 2.6.8-sarge-security: released (2.6.8-14) [117-reiserfs_file_64bit_size_t_fixes.dpatch]
-2.4.27-sarge-security: 
-2.4.19-woody-security: 
-2.4.18-woody-security: 
-2.4.17-woody-security: 
-2.4.16-woody-security: 
-2.4.17-woody-security-hppa: 
-2.4.17-woody-security-ia64: 
-2.4.18-woody-security-hppa: 
+2.4.27-sarge-security: N/A
+2.4.19-woody-security: N/A
+2.4.18-woody-security: N/A
+2.4.17-woody-security: N/A
+2.4.16-woody-security: N/A
+2.4.17-woody-security-hppa: N/A
+2.4.17-woody-security-ia64: N/A
+2.4.18-woody-security-hppa: N/A



More information about the Kernel-svn-changes mailing list