diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2007-12-23 12:26:24 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2007-12-23 12:26:24 +0000 |
commit | eab70b10bedd63d0ca0ff4a778aeb67533b12615 (patch) | |
tree | 5d3f3b6cb73a4216f4277c9ab5fb1a6659cb5e01 | |
parent | dbe82577c10105091fc3ff89ee493b660e776eeb (diff) |
merge info from maks
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1070 e094ebfe-e918-0410-adfb-c712417f3574
-rw-r--r-- | active/CVE-2007-3719 | 1 | ||||
-rw-r--r-- | active/CVE-2007-3739 | 5 | ||||
-rw-r--r-- | active/CVE-2007-4997 | 4 | ||||
-rw-r--r-- | active/CVE-2007-5938 | 5 | ||||
-rw-r--r-- | active/CVE-2007-6063 | 3 | ||||
-rw-r--r-- | retired/CVE-2006-6333 | 2 |
6 files changed, 12 insertions, 8 deletions
diff --git a/active/CVE-2007-3719 b/active/CVE-2007-3719 index 6fd2d5e5..846f06f9 100644 --- a/active/CVE-2007-3719 +++ b/active/CVE-2007-3719 @@ -7,6 +7,7 @@ Description: "Secretly Monopolizing the CPU Without Superuser Privileges." Ubuntu-Description: Notes: + jmm> check 638e13ac37a1a89473415f407cbffc1688a20fe2 Bugs: upstream: linux-2.6: diff --git a/active/CVE-2007-3739 b/active/CVE-2007-3739 index 999fd14d..032639d0 100644 --- a/active/CVE-2007-3739 +++ b/active/CVE-2007-3739 @@ -19,9 +19,10 @@ Ubuntu-Description: the stack from colliding with reserved kernel memory. Local attackers could exploit this and crash the system, causing a denial of service. Notes: + jmm> 68589bc353037f233fe510ad9ff432338c95db66 Bugs: -upstream: -linux-2.6: +upstream: released (2.6.20) +linux-2.6: released (2.6.20) 2.6.18-etch-security: released (2.6.18.dfsg.1-13etch3) [bugfix/prevent-stack-growth-into-hugetlb-region.patch] 2.6.8-sarge-security: 2.4.27-sarge-security: diff --git a/active/CVE-2007-4997 b/active/CVE-2007-4997 index 01f1780e..2c3f0cc9 100644 --- a/active/CVE-2007-4997 +++ b/active/CVE-2007-4997 @@ -17,8 +17,8 @@ Notes: > stacks etc. jmm> 04045f98e0457aba7d4e6736f37eed189c48a5f7 Bugs: -upstream: pending (2.6.24) -linux-2.6: needed +upstream: released (2.6.23) +linux-2.6: released (2.6.23-1) 2.6.18-etch-security: released (2.6.18.dfsg.1-13etch5) [bugfix/ieee80211-underflow.patch] 2.6.8-sarge-security: N/A 2.4.27-sarge-security: N/A diff --git a/active/CVE-2007-5938 b/active/CVE-2007-5938 index ef1e37bf..4124ec4d 100644 --- a/active/CVE-2007-5938 +++ b/active/CVE-2007-5938 @@ -8,9 +8,10 @@ References: http://article.gmane.org/gmane.linux.drivers.ipw3945.devel/1618 http://bugs.gentoo.org/show_bug.cgi?id=199209 Ubuntu-Description: -Notes: +Notes: + jmm> c4ba9621f4f241f8c4d4f620ad4257af59d21f3e Bugs: -upstream: +upstream: released (2.6.24-rc4) linux-2.6: released (2.6.23-2) 2.6.18-etch-security: N/A 2.6.8-sarge-security: N/A diff --git a/active/CVE-2007-6063 b/active/CVE-2007-6063 index acbbc72f..3fa3febe 100644 --- a/active/CVE-2007-6063 +++ b/active/CVE-2007-6063 @@ -9,9 +9,10 @@ References: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=0f13864e5b24d9cbe18d125d41bfa4b726a82e40 Ubuntu-Description: Notes: + jmm> eafe1aa37e6ec2d56f14732b5240c4dd09f0613a Bugs: upstream: released (2.6.24-rc4) [0f13864e5b24d9cbe18d125d41bfa4b726a82e40] -linux-2.6: +linux-2.6: released (2.6.23-2) 2.6.18-etch-security: released (2.6.18.dfsg.1-13etch6) [bugfix/isdn-net-overflow.patch] 2.6.8-sarge-security: 2.4.27-sarge-security: diff --git a/retired/CVE-2006-6333 b/retired/CVE-2006-6333 index ffe3c20f..714a4e85 100644 --- a/retired/CVE-2006-6333 +++ b/retired/CVE-2006-6333 @@ -11,7 +11,7 @@ Ubuntu-Description: Notes: jmm> Only 2.6.19 is affected Bugs: -upstream: +upstream: released (2.6.20) linux-2.6: N/A 2.6.18-etch-security: N/A 2.6.8-sarge-security: N/A |