On Wed, Aug 10, 2005 at 11:47:12AM +0200, Moritz Muehlenhoff wrote:
> Horms wrote:
> > As for which package to log a bug against, or cretion of duplicate bugs.
> > To be honest it doesn't matter. If you email
> > debian-kernel@lists.debian.org, then you should get a response,
> > regardless of if y
On Wed, Aug 10, 2005 at 12:04:05PM +0200, Christoph Hellwig wrote:
> On Wed, Aug 10, 2005 at 11:47:12AM +0200, Moritz Muehlenhoff wrote:
> > Horms wrote:
> > > As for which package to log a bug against, or cretion of duplicate bugs.
> > > To be honest it doesn't matter. If you email
> > > debian-ke
On Wed, Aug 10, 2005 at 11:47:12AM +0200, Moritz Muehlenhoff wrote:
> Horms wrote:
> > As for which package to log a bug against, or cretion of duplicate bugs.
> > To be honest it doesn't matter. If you email
> > debian-kernel@lists.debian.org, then you should get a response,
> > regardless of if y
Horms wrote:
> As for which package to log a bug against, or cretion of duplicate bugs.
> To be honest it doesn't matter. If you email
> debian-kernel@lists.debian.org, then you should get a response,
> regardless of if you open a bug in the BTS or not.
> CCing secure-testing-team@lists.alioth.debi
tag kernel-source-2.6.8 +pending
thanks
On Wed, Aug 10, 2005 at 02:53:07PM +1000, Geoff Crompton wrote:
> Package: kernel-source-2.6.8
> Version: 2.6.8-16
> Severity: critical
> Justification: root security hole
>
> SecurityFocus http://www.securityfocus.com/bid/14477 mentions an array index
> b
Package: kernel-source-2.6.8
Version: 2.6.8-16
Severity: critical
Justification: root security hole
SecurityFocus http://www.securityfocus.com/bid/14477 mentions an array index
buffer overflow.
In short, the suspect it can cause a denial of service attack, but
aren't sure whether or not it allows
6 matches
Mail list logo