[kernel-sec-discuss] r1078 - active retired

jmm at alioth.debian.org jmm at alioth.debian.org
Sat Dec 29 15:18:32 UTC 2007


Author: jmm
Date: 2007-12-29 15:18:32 +0000 (Sat, 29 Dec 2007)
New Revision: 1078

Added:
   retired/CVE-2007-3379
   retired/CVE-2007-4574
Removed:
   active/CVE-2007-3379
   active/CVE-2007-4574
Modified:
   active/CVE-2007-3380
Log:
retire two more issues


Deleted: active/CVE-2007-3379
===================================================================
--- active/CVE-2007-3379	2007-12-29 15:13:54 UTC (rev 1077)
+++ active/CVE-2007-3379	2007-12-29 15:18:32 UTC (rev 1078)
@@ -1,17 +0,0 @@
-Candidate: CVE-2007-3379
-References: 
-Description: 
-Ubuntu-Description: 
-Notes: 
- dannf> Red Hat believes this to be RH-specific, and indeed I've been unable
- dannf> to reproduce on etch/amd64.
-Bugs: 
-upstream: N/A
-linux-2.6: N/A
-2.6.18-etch-security: N/A
-2.6.8-sarge-security: N/A
-2.4.27-sarge-security: N/A
-2.6.15-dapper-security: N/A
-2.6.17-edgy-security: N/A
-2.6.20-feisty-security: N/A
-2.6.22-gutsy-security: N/A

Modified: active/CVE-2007-3380
===================================================================
--- active/CVE-2007-3380	2007-12-29 15:13:54 UTC (rev 1077)
+++ active/CVE-2007-3380	2007-12-29 15:18:32 UTC (rev 1078)
@@ -11,8 +11,8 @@
  jmm> redhat-cluster doesn't appear affected neither, TCP connection code
       not present. Fixed in git on 2007-07-09, marking 2.6.23 as fixed
 Bugs: 
-upstream: pending (2.6.23)
-linux-2.6: pending (2.6.23-1)
+upstream: released (2.6.23)
+linux-2.6: released (2.6.23-1)
 2.6.18-etch-security: N/A
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A

Deleted: active/CVE-2007-4574
===================================================================
--- active/CVE-2007-4574	2007-12-29 15:13:54 UTC (rev 1077)
+++ active/CVE-2007-4574	2007-12-29 15:18:32 UTC (rev 1078)
@@ -1,15 +0,0 @@
-Candidate: CVE-2007-4574
-References: 
-Description: 
-Ubuntu-Description: 
-Notes: 
- jmm> stack unwinder backport regression. Ubuntu, please check if you've backported this
-Bugs: 
-upstream: N/A
-linux-2.6: N/A
-2.6.18-etch-security: N/A
-2.6.8-sarge-security: N/A
-2.4.27-sarge-security: N/A
-2.6.15-dapper-security: N/A
-2.6.17-edgy-security: N/A
-2.6.20-feisty-security: N/A

Copied: retired/CVE-2007-3379 (from rev 1075, active/CVE-2007-3379)
===================================================================
--- retired/CVE-2007-3379	                        (rev 0)
+++ retired/CVE-2007-3379	2007-12-29 15:18:32 UTC (rev 1078)
@@ -0,0 +1,17 @@
+Candidate: CVE-2007-3379
+References: 
+Description: 
+Ubuntu-Description: 
+Notes: 
+ dannf> Red Hat believes this to be RH-specific, and indeed I've been unable
+ dannf> to reproduce on etch/amd64.
+Bugs: 
+upstream: N/A
+linux-2.6: N/A
+2.6.18-etch-security: N/A
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security: N/A
+2.6.15-dapper-security: N/A
+2.6.17-edgy-security: N/A
+2.6.20-feisty-security: N/A
+2.6.22-gutsy-security: N/A

Copied: retired/CVE-2007-4574 (from rev 1075, active/CVE-2007-4574)
===================================================================
--- retired/CVE-2007-4574	                        (rev 0)
+++ retired/CVE-2007-4574	2007-12-29 15:18:32 UTC (rev 1078)
@@ -0,0 +1,15 @@
+Candidate: CVE-2007-4574
+References: 
+Description: 
+Ubuntu-Description: 
+Notes: 
+ jmm> stack unwinder backport regression. Ubuntu, please check if you've backported this
+Bugs: 
+upstream: N/A
+linux-2.6: N/A
+2.6.18-etch-security: N/A
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security: N/A
+2.6.15-dapper-security: N/A
+2.6.17-edgy-security: N/A
+2.6.20-feisty-security: N/A




More information about the kernel-sec-discuss mailing list