summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2007-12-23 12:26:24 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2007-12-23 12:26:24 +0000
commiteab70b10bedd63d0ca0ff4a778aeb67533b12615 (patch)
tree5d3f3b6cb73a4216f4277c9ab5fb1a6659cb5e01
parentdbe82577c10105091fc3ff89ee493b660e776eeb (diff)
merge info from maks
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1070 e094ebfe-e918-0410-adfb-c712417f3574
-rw-r--r--active/CVE-2007-37191
-rw-r--r--active/CVE-2007-37395
-rw-r--r--active/CVE-2007-49974
-rw-r--r--active/CVE-2007-59385
-rw-r--r--active/CVE-2007-60633
-rw-r--r--retired/CVE-2006-63332
6 files changed, 12 insertions, 8 deletions
diff --git a/active/CVE-2007-3719 b/active/CVE-2007-3719
index 6fd2d5e5..846f06f9 100644
--- a/active/CVE-2007-3719
+++ b/active/CVE-2007-3719
@@ -7,6 +7,7 @@ Description:
"Secretly Monopolizing the CPU Without Superuser Privileges."
Ubuntu-Description:
Notes:
+ jmm> check 638e13ac37a1a89473415f407cbffc1688a20fe2
Bugs:
upstream:
linux-2.6:
diff --git a/active/CVE-2007-3739 b/active/CVE-2007-3739
index 999fd14d..032639d0 100644
--- a/active/CVE-2007-3739
+++ b/active/CVE-2007-3739
@@ -19,9 +19,10 @@ Ubuntu-Description:
the stack from colliding with reserved kernel memory. Local attackers
could exploit this and crash the system, causing a denial of service.
Notes:
+ jmm> 68589bc353037f233fe510ad9ff432338c95db66
Bugs:
-upstream:
-linux-2.6:
+upstream: released (2.6.20)
+linux-2.6: released (2.6.20)
2.6.18-etch-security: released (2.6.18.dfsg.1-13etch3) [bugfix/prevent-stack-growth-into-hugetlb-region.patch]
2.6.8-sarge-security:
2.4.27-sarge-security:
diff --git a/active/CVE-2007-4997 b/active/CVE-2007-4997
index 01f1780e..2c3f0cc9 100644
--- a/active/CVE-2007-4997
+++ b/active/CVE-2007-4997
@@ -17,8 +17,8 @@ Notes:
> stacks etc.
jmm> 04045f98e0457aba7d4e6736f37eed189c48a5f7
Bugs:
-upstream: pending (2.6.24)
-linux-2.6: needed
+upstream: released (2.6.23)
+linux-2.6: released (2.6.23-1)
2.6.18-etch-security: released (2.6.18.dfsg.1-13etch5) [bugfix/ieee80211-underflow.patch]
2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
diff --git a/active/CVE-2007-5938 b/active/CVE-2007-5938
index ef1e37bf..4124ec4d 100644
--- a/active/CVE-2007-5938
+++ b/active/CVE-2007-5938
@@ -8,9 +8,10 @@ References:
http://article.gmane.org/gmane.linux.drivers.ipw3945.devel/1618
http://bugs.gentoo.org/show_bug.cgi?id=199209
Ubuntu-Description:
-Notes:
+Notes:
+ jmm> c4ba9621f4f241f8c4d4f620ad4257af59d21f3e
Bugs:
-upstream:
+upstream: released (2.6.24-rc4)
linux-2.6: released (2.6.23-2)
2.6.18-etch-security: N/A
2.6.8-sarge-security: N/A
diff --git a/active/CVE-2007-6063 b/active/CVE-2007-6063
index acbbc72f..3fa3febe 100644
--- a/active/CVE-2007-6063
+++ b/active/CVE-2007-6063
@@ -9,9 +9,10 @@ References:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=0f13864e5b24d9cbe18d125d41bfa4b726a82e40
Ubuntu-Description:
Notes:
+ jmm> eafe1aa37e6ec2d56f14732b5240c4dd09f0613a
Bugs:
upstream: released (2.6.24-rc4) [0f13864e5b24d9cbe18d125d41bfa4b726a82e40]
-linux-2.6:
+linux-2.6: released (2.6.23-2)
2.6.18-etch-security: released (2.6.18.dfsg.1-13etch6) [bugfix/isdn-net-overflow.patch]
2.6.8-sarge-security:
2.4.27-sarge-security:
diff --git a/retired/CVE-2006-6333 b/retired/CVE-2006-6333
index ffe3c20f..714a4e85 100644
--- a/retired/CVE-2006-6333
+++ b/retired/CVE-2006-6333
@@ -11,7 +11,7 @@ Ubuntu-Description:
Notes:
jmm> Only 2.6.19 is affected
Bugs:
-upstream:
+upstream: released (2.6.20)
linux-2.6: N/A
2.6.18-etch-security: N/A
2.6.8-sarge-security: N/A

© 2014-2024 Faster IT GmbH | imprint | privacy policy