[kernel-sec-discuss] r1457 - active

Moritz Muehlenhoff jmm at alioth.debian.org
Sat Aug 15 01:11:51 UTC 2009


Author: jmm
Date: 2009-08-15 01:11:51 +0000 (Sat, 15 Aug 2009)
New Revision: 1457

Modified:
   active/CVE-2007-6514
Log:
fixed


Modified: active/CVE-2007-6514
===================================================================
--- active/CVE-2007-6514	2009-08-14 22:24:20 UTC (rev 1456)
+++ active/CVE-2007-6514	2009-08-15 01:11:51 UTC (rev 1457)
@@ -4,20 +4,18 @@
 Ubuntu-Description: 
 Notes: 
  jmm> Needs fixing in smbfs rather than in Apache
+ jmm> Also fixed by 3b7c8108273bed41a2fc04533cc9f2026ff38c8e
  the attack vector for this one is so obscure: the worst that can
  happen is disclosure of scripts hosted on an apache server serving
- those scripts, and only if those scripts are on a windows share.  i'd
- almost be inclined to say no-dsa for this one (or issue a dsa that
- says don't host your apache scripts on a windows share).  it's hardly
- worth worrying about.
+ those scripts, and only if those scripts are on a windows share.
 Bugs: 
-upstream: 
-linux-2.6: 
-2.6.18-etch-security: ignored "no upstream fix"
-2.6.24-etch-security: ignored "no upstream fix"
-2.6.26-lenny-security: ignored "no upstream fix"
-2.6.15-dapper-security: ignored "no upstream fix"
+upstream: released (2.6.17)
+linux-2.6: released (2.6.17-1)
+2.6.18-etch-security: N/A
+2.6.24-etch-security: N/A
+2.6.26-lenny-security: N/A
+2.6.15-dapper-security:  
 2.6.17-edgy-security: ignored (EOL)
-2.6.20-feisty-security: ignored (EOL)
-2.6.22-gutsy-security: ignored "no upstream fix"
-2.6.24-hardy-security: ignored "no upstream fix"
+2.6.20-feisty-security: N/A
+2.6.22-gutsy-security: N/A
+2.6.24-hardy-security: N/A




More information about the kernel-sec-discuss mailing list