[kernel-sec-discuss] r1760 - active ignored

Moritz Muehlenhoff jmm at alioth.debian.org
Thu Mar 4 23:30:47 UTC 2010


Author: jmm
Date: 2010-03-04 23:30:43 +0000 (Thu, 04 Mar 2010)
New Revision: 1760

Added:
   ignored/CVE-2007-3719
Removed:
   active/CVE-2007-3719
Log:
more to ignored


Deleted: active/CVE-2007-3719
===================================================================
--- active/CVE-2007-3719	2010-03-04 23:30:06 UTC (rev 1759)
+++ active/CVE-2007-3719	2010-03-04 23:30:43 UTC (rev 1760)
@@ -1,21 +0,0 @@
-Candidate: CVE-2007-3719
-References: 
-Description: 
- The process scheduler in the Linux kernel 2.6.16 gives preference to
- "interactive" processes that perform voluntary sleeps, which allows local
- users to cause a denial of service (CPU consumption), as described in
- "Secretly Monopolizing the CPU Without Superuser Privileges."
-Ubuntu-Description: 
-Notes: 
- jmm> check 638e13ac37a1a89473415f407cbffc1688a20fe2 
-Bugs: 
-upstream: 
-linux-2.6:
-2.6.18-etch-security: ignored (2.6.18.dfsg.1-13etch6) "no upstream fix"
-2.6.24-etch-security: ignored "low priority/no upstream fix"
-2.6.26-lenny-security: ignored "low priority/no upstream fix"
-2.6.8-sarge-security: ignored (2.6.8-17sarge1) "no upstream fix"
-2.4.27-sarge-security: ignored (2.4.27-10sarge6) "no upstream fix"
-2.6.15-dapper-security: ignored (low priority, no obvious upstream fix)
-2.6.17-edgy-security: ignored (EOL)
-2.6.20-feisty-security: ignored (low priority, no obvious upstream fix)

Copied: ignored/CVE-2007-3719 (from rev 1754, active/CVE-2007-3719)
===================================================================
--- ignored/CVE-2007-3719	                        (rev 0)
+++ ignored/CVE-2007-3719	2010-03-04 23:30:43 UTC (rev 1760)
@@ -0,0 +1,21 @@
+Candidate: CVE-2007-3719
+References: 
+Description: 
+ The process scheduler in the Linux kernel 2.6.16 gives preference to
+ "interactive" processes that perform voluntary sleeps, which allows local
+ users to cause a denial of service (CPU consumption), as described in
+ "Secretly Monopolizing the CPU Without Superuser Privileges."
+Ubuntu-Description: 
+Notes: 
+ jmm> check 638e13ac37a1a89473415f407cbffc1688a20fe2 
+Bugs: 
+upstream: 
+linux-2.6:
+2.6.18-etch-security: ignored (2.6.18.dfsg.1-13etch6) "no upstream fix"
+2.6.24-etch-security: ignored "low priority/no upstream fix"
+2.6.26-lenny-security: ignored "low priority/no upstream fix"
+2.6.8-sarge-security: ignored (2.6.8-17sarge1) "no upstream fix"
+2.4.27-sarge-security: ignored (2.4.27-10sarge6) "no upstream fix"
+2.6.15-dapper-security: ignored (low priority, no obvious upstream fix)
+2.6.17-edgy-security: ignored (EOL)
+2.6.20-feisty-security: ignored (low priority, no obvious upstream fix)




More information about the kernel-sec-discuss mailing list