[kernel-sec-discuss] r1457 - active
Moritz Muehlenhoff
jmm at alioth.debian.org
Sat Aug 15 01:11:51 UTC 2009
Author: jmm
Date: 2009-08-15 01:11:51 +0000 (Sat, 15 Aug 2009)
New Revision: 1457
Modified:
active/CVE-2007-6514
Log:
fixed
Modified: active/CVE-2007-6514
===================================================================
--- active/CVE-2007-6514 2009-08-14 22:24:20 UTC (rev 1456)
+++ active/CVE-2007-6514 2009-08-15 01:11:51 UTC (rev 1457)
@@ -4,20 +4,18 @@
Ubuntu-Description:
Notes:
jmm> Needs fixing in smbfs rather than in Apache
+ jmm> Also fixed by 3b7c8108273bed41a2fc04533cc9f2026ff38c8e
the attack vector for this one is so obscure: the worst that can
happen is disclosure of scripts hosted on an apache server serving
- those scripts, and only if those scripts are on a windows share. i'd
- almost be inclined to say no-dsa for this one (or issue a dsa that
- says don't host your apache scripts on a windows share). it's hardly
- worth worrying about.
+ those scripts, and only if those scripts are on a windows share.
Bugs:
-upstream:
-linux-2.6:
-2.6.18-etch-security: ignored "no upstream fix"
-2.6.24-etch-security: ignored "no upstream fix"
-2.6.26-lenny-security: ignored "no upstream fix"
-2.6.15-dapper-security: ignored "no upstream fix"
+upstream: released (2.6.17)
+linux-2.6: released (2.6.17-1)
+2.6.18-etch-security: N/A
+2.6.24-etch-security: N/A
+2.6.26-lenny-security: N/A
+2.6.15-dapper-security:
2.6.17-edgy-security: ignored (EOL)
-2.6.20-feisty-security: ignored (EOL)
-2.6.22-gutsy-security: ignored "no upstream fix"
-2.6.24-hardy-security: ignored "no upstream fix"
+2.6.20-feisty-security: N/A
+2.6.22-gutsy-security: N/A
+2.6.24-hardy-security: N/A
More information about the kernel-sec-discuss
mailing list