[kernel-sec-discuss] r1078 - active retired
jmm at alioth.debian.org
jmm at alioth.debian.org
Sat Dec 29 15:18:32 UTC 2007
Author: jmm
Date: 2007-12-29 15:18:32 +0000 (Sat, 29 Dec 2007)
New Revision: 1078
Added:
retired/CVE-2007-3379
retired/CVE-2007-4574
Removed:
active/CVE-2007-3379
active/CVE-2007-4574
Modified:
active/CVE-2007-3380
Log:
retire two more issues
Deleted: active/CVE-2007-3379
===================================================================
--- active/CVE-2007-3379 2007-12-29 15:13:54 UTC (rev 1077)
+++ active/CVE-2007-3379 2007-12-29 15:18:32 UTC (rev 1078)
@@ -1,17 +0,0 @@
-Candidate: CVE-2007-3379
-References:
-Description:
-Ubuntu-Description:
-Notes:
- dannf> Red Hat believes this to be RH-specific, and indeed I've been unable
- dannf> to reproduce on etch/amd64.
-Bugs:
-upstream: N/A
-linux-2.6: N/A
-2.6.18-etch-security: N/A
-2.6.8-sarge-security: N/A
-2.4.27-sarge-security: N/A
-2.6.15-dapper-security: N/A
-2.6.17-edgy-security: N/A
-2.6.20-feisty-security: N/A
-2.6.22-gutsy-security: N/A
Modified: active/CVE-2007-3380
===================================================================
--- active/CVE-2007-3380 2007-12-29 15:13:54 UTC (rev 1077)
+++ active/CVE-2007-3380 2007-12-29 15:18:32 UTC (rev 1078)
@@ -11,8 +11,8 @@
jmm> redhat-cluster doesn't appear affected neither, TCP connection code
not present. Fixed in git on 2007-07-09, marking 2.6.23 as fixed
Bugs:
-upstream: pending (2.6.23)
-linux-2.6: pending (2.6.23-1)
+upstream: released (2.6.23)
+linux-2.6: released (2.6.23-1)
2.6.18-etch-security: N/A
2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
Deleted: active/CVE-2007-4574
===================================================================
--- active/CVE-2007-4574 2007-12-29 15:13:54 UTC (rev 1077)
+++ active/CVE-2007-4574 2007-12-29 15:18:32 UTC (rev 1078)
@@ -1,15 +0,0 @@
-Candidate: CVE-2007-4574
-References:
-Description:
-Ubuntu-Description:
-Notes:
- jmm> stack unwinder backport regression. Ubuntu, please check if you've backported this
-Bugs:
-upstream: N/A
-linux-2.6: N/A
-2.6.18-etch-security: N/A
-2.6.8-sarge-security: N/A
-2.4.27-sarge-security: N/A
-2.6.15-dapper-security: N/A
-2.6.17-edgy-security: N/A
-2.6.20-feisty-security: N/A
Copied: retired/CVE-2007-3379 (from rev 1075, active/CVE-2007-3379)
===================================================================
--- retired/CVE-2007-3379 (rev 0)
+++ retired/CVE-2007-3379 2007-12-29 15:18:32 UTC (rev 1078)
@@ -0,0 +1,17 @@
+Candidate: CVE-2007-3379
+References:
+Description:
+Ubuntu-Description:
+Notes:
+ dannf> Red Hat believes this to be RH-specific, and indeed I've been unable
+ dannf> to reproduce on etch/amd64.
+Bugs:
+upstream: N/A
+linux-2.6: N/A
+2.6.18-etch-security: N/A
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security: N/A
+2.6.15-dapper-security: N/A
+2.6.17-edgy-security: N/A
+2.6.20-feisty-security: N/A
+2.6.22-gutsy-security: N/A
Copied: retired/CVE-2007-4574 (from rev 1075, active/CVE-2007-4574)
===================================================================
--- retired/CVE-2007-4574 (rev 0)
+++ retired/CVE-2007-4574 2007-12-29 15:18:32 UTC (rev 1078)
@@ -0,0 +1,15 @@
+Candidate: CVE-2007-4574
+References:
+Description:
+Ubuntu-Description:
+Notes:
+ jmm> stack unwinder backport regression. Ubuntu, please check if you've backported this
+Bugs:
+upstream: N/A
+linux-2.6: N/A
+2.6.18-etch-security: N/A
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security: N/A
+2.6.15-dapper-security: N/A
+2.6.17-edgy-security: N/A
+2.6.20-feisty-security: N/A
More information about the kernel-sec-discuss
mailing list