[kernel-sec-discuss] r1042 - active

jmm at alioth.debian.org jmm at alioth.debian.org
Tue Nov 27 21:09:10 UTC 2007


Author: jmm
Date: 2007-11-27 21:09:10 +0000 (Tue, 27 Nov 2007)
New Revision: 1042

Modified:
   active/CVE-2007-5904
   active/CVE-2007-5908
Log:
updates


Modified: active/CVE-2007-5904
===================================================================
--- active/CVE-2007-5904	2007-11-26 00:19:58 UTC (rev 1041)
+++ active/CVE-2007-5904	2007-11-27 21:09:10 UTC (rev 1042)
@@ -10,6 +10,7 @@
  http://git.kernel.org/?p=linux/kernel/git/sfrench/cifs-2.6.git;a=commit;h=133672efbc1085f9af990bdc145e1822ea93bcf3
 Ubuntu-Description: 
 Notes: 
+ jmm> ABI breaker
 Bugs: 
 upstream: 
 linux-2.6: 

Modified: active/CVE-2007-5908
===================================================================
--- active/CVE-2007-5908	2007-11-26 00:19:58 UTC (rev 1041)
+++ active/CVE-2007-5908	2007-11-27 21:09:10 UTC (rev 1042)
@@ -10,10 +10,10 @@
 Notes: 
  kees> this is not actually an exploitable security issue. there is no way to add clock sources that could trigger the overflow.
 Bugs: 
-upstream: 
-linux-2.6: 
-2.6.18-etch-security: ignored (2.6.18.dfsg.1-13etch5) "Not exploitable"
-2.6.8-sarge-security: ignored (2.6.8-17sarge1) "Not exploitable"
+upstream: N/A
+linux-2.6: N/A
+2.6.18-etch-security: N/A
+2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
 2.6.15-dapper-security: N/A
 2.6.17-edgy-security: N/A




More information about the kernel-sec-discuss mailing list