diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2010-03-04 23:30:43 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2010-03-04 23:30:43 +0000 |
commit | b42c623a4dece58cfe8166fd25c2107bcc5089b7 (patch) | |
tree | 5ebf0bc9df3b5df0be9b7d2d0859269dcd064686 /ignored | |
parent | 8b89b4be7cf2cf2a85f2e5521046e5a53d6a90dc (diff) |
more to ignored
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1760 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'ignored')
-rw-r--r-- | ignored/CVE-2007-3719 | 21 |
1 files changed, 21 insertions, 0 deletions
diff --git a/ignored/CVE-2007-3719 b/ignored/CVE-2007-3719 new file mode 100644 index 00000000..91e0ef85 --- /dev/null +++ b/ignored/CVE-2007-3719 @@ -0,0 +1,21 @@ +Candidate: CVE-2007-3719 +References: +Description: + The process scheduler in the Linux kernel 2.6.16 gives preference to + "interactive" processes that perform voluntary sleeps, which allows local + users to cause a denial of service (CPU consumption), as described in + "Secretly Monopolizing the CPU Without Superuser Privileges." +Ubuntu-Description: +Notes: + jmm> check 638e13ac37a1a89473415f407cbffc1688a20fe2 +Bugs: +upstream: +linux-2.6: +2.6.18-etch-security: ignored (2.6.18.dfsg.1-13etch6) "no upstream fix" +2.6.24-etch-security: ignored "low priority/no upstream fix" +2.6.26-lenny-security: ignored "low priority/no upstream fix" +2.6.8-sarge-security: ignored (2.6.8-17sarge1) "no upstream fix" +2.4.27-sarge-security: ignored (2.4.27-10sarge6) "no upstream fix" +2.6.15-dapper-security: ignored (low priority, no obvious upstream fix) +2.6.17-edgy-security: ignored (EOL) +2.6.20-feisty-security: ignored (low priority, no obvious upstream fix) |