[kernel-sec-discuss] r1042 - active
jmm at alioth.debian.org
jmm at alioth.debian.org
Tue Nov 27 21:09:10 UTC 2007
Author: jmm
Date: 2007-11-27 21:09:10 +0000 (Tue, 27 Nov 2007)
New Revision: 1042
Modified:
active/CVE-2007-5904
active/CVE-2007-5908
Log:
updates
Modified: active/CVE-2007-5904
===================================================================
--- active/CVE-2007-5904 2007-11-26 00:19:58 UTC (rev 1041)
+++ active/CVE-2007-5904 2007-11-27 21:09:10 UTC (rev 1042)
@@ -10,6 +10,7 @@
http://git.kernel.org/?p=linux/kernel/git/sfrench/cifs-2.6.git;a=commit;h=133672efbc1085f9af990bdc145e1822ea93bcf3
Ubuntu-Description:
Notes:
+ jmm> ABI breaker
Bugs:
upstream:
linux-2.6:
Modified: active/CVE-2007-5908
===================================================================
--- active/CVE-2007-5908 2007-11-26 00:19:58 UTC (rev 1041)
+++ active/CVE-2007-5908 2007-11-27 21:09:10 UTC (rev 1042)
@@ -10,10 +10,10 @@
Notes:
kees> this is not actually an exploitable security issue. there is no way to add clock sources that could trigger the overflow.
Bugs:
-upstream:
-linux-2.6:
-2.6.18-etch-security: ignored (2.6.18.dfsg.1-13etch5) "Not exploitable"
-2.6.8-sarge-security: ignored (2.6.8-17sarge1) "Not exploitable"
+upstream: N/A
+linux-2.6: N/A
+2.6.18-etch-security: N/A
+2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
2.6.15-dapper-security: N/A
2.6.17-edgy-security: N/A
More information about the kernel-sec-discuss
mailing list