[kernel-sec-discuss] r1760 - active ignored
Moritz Muehlenhoff
jmm at alioth.debian.org
Thu Mar 4 23:30:47 UTC 2010
Author: jmm
Date: 2010-03-04 23:30:43 +0000 (Thu, 04 Mar 2010)
New Revision: 1760
Added:
ignored/CVE-2007-3719
Removed:
active/CVE-2007-3719
Log:
more to ignored
Deleted: active/CVE-2007-3719
===================================================================
--- active/CVE-2007-3719 2010-03-04 23:30:06 UTC (rev 1759)
+++ active/CVE-2007-3719 2010-03-04 23:30:43 UTC (rev 1760)
@@ -1,21 +0,0 @@
-Candidate: CVE-2007-3719
-References:
-Description:
- The process scheduler in the Linux kernel 2.6.16 gives preference to
- "interactive" processes that perform voluntary sleeps, which allows local
- users to cause a denial of service (CPU consumption), as described in
- "Secretly Monopolizing the CPU Without Superuser Privileges."
-Ubuntu-Description:
-Notes:
- jmm> check 638e13ac37a1a89473415f407cbffc1688a20fe2
-Bugs:
-upstream:
-linux-2.6:
-2.6.18-etch-security: ignored (2.6.18.dfsg.1-13etch6) "no upstream fix"
-2.6.24-etch-security: ignored "low priority/no upstream fix"
-2.6.26-lenny-security: ignored "low priority/no upstream fix"
-2.6.8-sarge-security: ignored (2.6.8-17sarge1) "no upstream fix"
-2.4.27-sarge-security: ignored (2.4.27-10sarge6) "no upstream fix"
-2.6.15-dapper-security: ignored (low priority, no obvious upstream fix)
-2.6.17-edgy-security: ignored (EOL)
-2.6.20-feisty-security: ignored (low priority, no obvious upstream fix)
Copied: ignored/CVE-2007-3719 (from rev 1754, active/CVE-2007-3719)
===================================================================
--- ignored/CVE-2007-3719 (rev 0)
+++ ignored/CVE-2007-3719 2010-03-04 23:30:43 UTC (rev 1760)
@@ -0,0 +1,21 @@
+Candidate: CVE-2007-3719
+References:
+Description:
+ The process scheduler in the Linux kernel 2.6.16 gives preference to
+ "interactive" processes that perform voluntary sleeps, which allows local
+ users to cause a denial of service (CPU consumption), as described in
+ "Secretly Monopolizing the CPU Without Superuser Privileges."
+Ubuntu-Description:
+Notes:
+ jmm> check 638e13ac37a1a89473415f407cbffc1688a20fe2
+Bugs:
+upstream:
+linux-2.6:
+2.6.18-etch-security: ignored (2.6.18.dfsg.1-13etch6) "no upstream fix"
+2.6.24-etch-security: ignored "low priority/no upstream fix"
+2.6.26-lenny-security: ignored "low priority/no upstream fix"
+2.6.8-sarge-security: ignored (2.6.8-17sarge1) "no upstream fix"
+2.4.27-sarge-security: ignored (2.4.27-10sarge6) "no upstream fix"
+2.6.15-dapper-security: ignored (low priority, no obvious upstream fix)
+2.6.17-edgy-security: ignored (EOL)
+2.6.20-feisty-security: ignored (low priority, no obvious upstream fix)
More information about the kernel-sec-discuss
mailing list