Author: dannf Date: Mon Jan 30 01:10:43 2006 New Revision: 5629 Modified: patch-tracking/CVE-2005-0532 Log: 2.4 isn't vulnerable
Modified: patch-tracking/CVE-2005-0532 ============================================================================== --- patch-tracking/CVE-2005-0532 (original) +++ patch-tracking/CVE-2005-0532 Mon Jan 30 01:10:43 2006 @@ -14,15 +14,16 @@ architectures, may allow local users to trigger a buffer overflow as a result of casting discrepancies between size_t and int data types. Notes: + dannf> Vulnerable code didn't exist in 2.4 Bugs: -upstream: -linux-2.6: +upstream: released (2.6.11-rc3) +linux-2.6: N/A 2.6.8-sarge-security: released (2.6.8-14) [117-reiserfs_file_64bit_size_t_fixes.dpatch] -2.4.27-sarge-security: -2.4.19-woody-security: -2.4.18-woody-security: -2.4.17-woody-security: -2.4.16-woody-security: -2.4.17-woody-security-hppa: -2.4.17-woody-security-ia64: -2.4.18-woody-security-hppa: +2.4.27-sarge-security: N/A +2.4.19-woody-security: N/A +2.4.18-woody-security: N/A +2.4.17-woody-security: N/A +2.4.16-woody-security: N/A +2.4.17-woody-security-hppa: N/A +2.4.17-woody-security-ia64: N/A +2.4.18-woody-security-hppa: N/A _______________________________________________ Kernel-svn-changes mailing list [email protected] http://lists.alioth.debian.org/mailman/listinfo/kernel-svn-changes

