[kernel-sec-discuss] r1070 - active retired

jmm at alioth.debian.org jmm at alioth.debian.org
Sun Dec 23 12:26:24 UTC 2007


Author: jmm
Date: 2007-12-23 12:26:24 +0000 (Sun, 23 Dec 2007)
New Revision: 1070

Modified:
   active/CVE-2007-3719
   active/CVE-2007-3739
   active/CVE-2007-4997
   active/CVE-2007-5938
   active/CVE-2007-6063
   retired/CVE-2006-6333
Log:
merge info from maks


Modified: active/CVE-2007-3719
===================================================================
--- active/CVE-2007-3719	2007-12-23 12:15:15 UTC (rev 1069)
+++ active/CVE-2007-3719	2007-12-23 12:26:24 UTC (rev 1070)
@@ -7,6 +7,7 @@
  "Secretly Monopolizing the CPU Without Superuser Privileges."
 Ubuntu-Description: 
 Notes: 
+ jmm> check 638e13ac37a1a89473415f407cbffc1688a20fe2 
 Bugs: 
 upstream: 
 linux-2.6: 

Modified: active/CVE-2007-3739
===================================================================
--- active/CVE-2007-3739	2007-12-23 12:15:15 UTC (rev 1069)
+++ active/CVE-2007-3739	2007-12-23 12:26:24 UTC (rev 1070)
@@ -19,9 +19,10 @@
  the stack from colliding with reserved kernel memory.  Local attackers
  could exploit this and crash the system, causing a denial of service.
 Notes: 
+ jmm> 68589bc353037f233fe510ad9ff432338c95db66
 Bugs: 
-upstream: 
-linux-2.6: 
+upstream: released (2.6.20)
+linux-2.6: released (2.6.20)
 2.6.18-etch-security: released (2.6.18.dfsg.1-13etch3) [bugfix/prevent-stack-growth-into-hugetlb-region.patch]
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 

Modified: active/CVE-2007-4997
===================================================================
--- active/CVE-2007-4997	2007-12-23 12:15:15 UTC (rev 1069)
+++ active/CVE-2007-4997	2007-12-23 12:26:24 UTC (rev 1070)
@@ -17,8 +17,8 @@
  > stacks etc.
  jmm> 04045f98e0457aba7d4e6736f37eed189c48a5f7
 Bugs: 
-upstream: pending (2.6.24)
-linux-2.6: needed
+upstream: released (2.6.23)
+linux-2.6: released (2.6.23-1)
 2.6.18-etch-security: released (2.6.18.dfsg.1-13etch5) [bugfix/ieee80211-underflow.patch]
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A

Modified: active/CVE-2007-5938
===================================================================
--- active/CVE-2007-5938	2007-12-23 12:15:15 UTC (rev 1069)
+++ active/CVE-2007-5938	2007-12-23 12:26:24 UTC (rev 1070)
@@ -8,9 +8,10 @@
  http://article.gmane.org/gmane.linux.drivers.ipw3945.devel/1618
  http://bugs.gentoo.org/show_bug.cgi?id=199209
 Ubuntu-Description: 
-Notes: 
+Notes:
+ jmm> c4ba9621f4f241f8c4d4f620ad4257af59d21f3e  
 Bugs: 
-upstream: 
+upstream: released (2.6.24-rc4)
 linux-2.6: released (2.6.23-2)
 2.6.18-etch-security: N/A
 2.6.8-sarge-security: N/A

Modified: active/CVE-2007-6063
===================================================================
--- active/CVE-2007-6063	2007-12-23 12:15:15 UTC (rev 1069)
+++ active/CVE-2007-6063	2007-12-23 12:26:24 UTC (rev 1070)
@@ -9,9 +9,10 @@
  http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=0f13864e5b24d9cbe18d125d41bfa4b726a82e40
 Ubuntu-Description: 
 Notes: 
+ jmm> eafe1aa37e6ec2d56f14732b5240c4dd09f0613a 
 Bugs: 
 upstream: released (2.6.24-rc4) [0f13864e5b24d9cbe18d125d41bfa4b726a82e40]
-linux-2.6: 
+linux-2.6: released (2.6.23-2)
 2.6.18-etch-security: released (2.6.18.dfsg.1-13etch6) [bugfix/isdn-net-overflow.patch]
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 

Modified: retired/CVE-2006-6333
===================================================================
--- retired/CVE-2006-6333	2007-12-23 12:15:15 UTC (rev 1069)
+++ retired/CVE-2006-6333	2007-12-23 12:26:24 UTC (rev 1070)
@@ -11,7 +11,7 @@
 Notes: 
  jmm> Only 2.6.19 is affected
 Bugs: 
-upstream: 
+upstream: released (2.6.20)
 linux-2.6: N/A
 2.6.18-etch-security: N/A 
 2.6.8-sarge-security: N/A




More information about the kernel-sec-discuss mailing list