[kernel-sec-discuss] r1070 - active retired
jmm at alioth.debian.org
jmm at alioth.debian.org
Sun Dec 23 12:26:24 UTC 2007
Author: jmm
Date: 2007-12-23 12:26:24 +0000 (Sun, 23 Dec 2007)
New Revision: 1070
Modified:
active/CVE-2007-3719
active/CVE-2007-3739
active/CVE-2007-4997
active/CVE-2007-5938
active/CVE-2007-6063
retired/CVE-2006-6333
Log:
merge info from maks
Modified: active/CVE-2007-3719
===================================================================
--- active/CVE-2007-3719 2007-12-23 12:15:15 UTC (rev 1069)
+++ active/CVE-2007-3719 2007-12-23 12:26:24 UTC (rev 1070)
@@ -7,6 +7,7 @@
"Secretly Monopolizing the CPU Without Superuser Privileges."
Ubuntu-Description:
Notes:
+ jmm> check 638e13ac37a1a89473415f407cbffc1688a20fe2
Bugs:
upstream:
linux-2.6:
Modified: active/CVE-2007-3739
===================================================================
--- active/CVE-2007-3739 2007-12-23 12:15:15 UTC (rev 1069)
+++ active/CVE-2007-3739 2007-12-23 12:26:24 UTC (rev 1070)
@@ -19,9 +19,10 @@
the stack from colliding with reserved kernel memory. Local attackers
could exploit this and crash the system, causing a denial of service.
Notes:
+ jmm> 68589bc353037f233fe510ad9ff432338c95db66
Bugs:
-upstream:
-linux-2.6:
+upstream: released (2.6.20)
+linux-2.6: released (2.6.20)
2.6.18-etch-security: released (2.6.18.dfsg.1-13etch3) [bugfix/prevent-stack-growth-into-hugetlb-region.patch]
2.6.8-sarge-security:
2.4.27-sarge-security:
Modified: active/CVE-2007-4997
===================================================================
--- active/CVE-2007-4997 2007-12-23 12:15:15 UTC (rev 1069)
+++ active/CVE-2007-4997 2007-12-23 12:26:24 UTC (rev 1070)
@@ -17,8 +17,8 @@
> stacks etc.
jmm> 04045f98e0457aba7d4e6736f37eed189c48a5f7
Bugs:
-upstream: pending (2.6.24)
-linux-2.6: needed
+upstream: released (2.6.23)
+linux-2.6: released (2.6.23-1)
2.6.18-etch-security: released (2.6.18.dfsg.1-13etch5) [bugfix/ieee80211-underflow.patch]
2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
Modified: active/CVE-2007-5938
===================================================================
--- active/CVE-2007-5938 2007-12-23 12:15:15 UTC (rev 1069)
+++ active/CVE-2007-5938 2007-12-23 12:26:24 UTC (rev 1070)
@@ -8,9 +8,10 @@
http://article.gmane.org/gmane.linux.drivers.ipw3945.devel/1618
http://bugs.gentoo.org/show_bug.cgi?id=199209
Ubuntu-Description:
-Notes:
+Notes:
+ jmm> c4ba9621f4f241f8c4d4f620ad4257af59d21f3e
Bugs:
-upstream:
+upstream: released (2.6.24-rc4)
linux-2.6: released (2.6.23-2)
2.6.18-etch-security: N/A
2.6.8-sarge-security: N/A
Modified: active/CVE-2007-6063
===================================================================
--- active/CVE-2007-6063 2007-12-23 12:15:15 UTC (rev 1069)
+++ active/CVE-2007-6063 2007-12-23 12:26:24 UTC (rev 1070)
@@ -9,9 +9,10 @@
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=0f13864e5b24d9cbe18d125d41bfa4b726a82e40
Ubuntu-Description:
Notes:
+ jmm> eafe1aa37e6ec2d56f14732b5240c4dd09f0613a
Bugs:
upstream: released (2.6.24-rc4) [0f13864e5b24d9cbe18d125d41bfa4b726a82e40]
-linux-2.6:
+linux-2.6: released (2.6.23-2)
2.6.18-etch-security: released (2.6.18.dfsg.1-13etch6) [bugfix/isdn-net-overflow.patch]
2.6.8-sarge-security:
2.4.27-sarge-security:
Modified: retired/CVE-2006-6333
===================================================================
--- retired/CVE-2006-6333 2007-12-23 12:15:15 UTC (rev 1069)
+++ retired/CVE-2006-6333 2007-12-23 12:26:24 UTC (rev 1070)
@@ -11,7 +11,7 @@
Notes:
jmm> Only 2.6.19 is affected
Bugs:
-upstream:
+upstream: released (2.6.20)
linux-2.6: N/A
2.6.18-etch-security: N/A
2.6.8-sarge-security: N/A
More information about the kernel-sec-discuss
mailing list