summaryrefslogtreecommitdiffstats
path: root/ignored
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2010-03-04 23:30:43 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2010-03-04 23:30:43 +0000
commitb42c623a4dece58cfe8166fd25c2107bcc5089b7 (patch)
tree5ebf0bc9df3b5df0be9b7d2d0859269dcd064686 /ignored
parent8b89b4be7cf2cf2a85f2e5521046e5a53d6a90dc (diff)
more to ignored
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1760 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'ignored')
-rw-r--r--ignored/CVE-2007-371921
1 files changed, 21 insertions, 0 deletions
diff --git a/ignored/CVE-2007-3719 b/ignored/CVE-2007-3719
new file mode 100644
index 00000000..91e0ef85
--- /dev/null
+++ b/ignored/CVE-2007-3719
@@ -0,0 +1,21 @@
+Candidate: CVE-2007-3719
+References:
+Description:
+ The process scheduler in the Linux kernel 2.6.16 gives preference to
+ "interactive" processes that perform voluntary sleeps, which allows local
+ users to cause a denial of service (CPU consumption), as described in
+ "Secretly Monopolizing the CPU Without Superuser Privileges."
+Ubuntu-Description:
+Notes:
+ jmm> check 638e13ac37a1a89473415f407cbffc1688a20fe2
+Bugs:
+upstream:
+linux-2.6:
+2.6.18-etch-security: ignored (2.6.18.dfsg.1-13etch6) "no upstream fix"
+2.6.24-etch-security: ignored "low priority/no upstream fix"
+2.6.26-lenny-security: ignored "low priority/no upstream fix"
+2.6.8-sarge-security: ignored (2.6.8-17sarge1) "no upstream fix"
+2.4.27-sarge-security: ignored (2.4.27-10sarge6) "no upstream fix"
+2.6.15-dapper-security: ignored (low priority, no obvious upstream fix)
+2.6.17-edgy-security: ignored (EOL)
+2.6.20-feisty-security: ignored (low priority, no obvious upstream fix)

© 2014-2024 Faster IT GmbH | imprint | privacy policy