[kernel-sec-discuss] r1313 - dsa-texts

micah at alioth.debian.org micah at alioth.debian.org
Thu Mar 19 20:53:21 UTC 2009


Author: micah
Date: 2009-03-19 20:53:21 +0000 (Thu, 19 Mar 2009)
New Revision: 1313

Modified:
   dsa-texts/2.6.26-13lenny2
Log:
minor formatting tweaks and put in a missing word


Modified: dsa-texts/2.6.26-13lenny2
===================================================================
--- dsa-texts/2.6.26-13lenny2	2009-03-19 20:38:16 UTC (rev 1312)
+++ dsa-texts/2.6.26-13lenny2	2009-03-19 20:53:21 UTC (rev 1313)
@@ -19,37 +19,38 @@
 
 CVE-2009-0029
 
-    Christian Borntraeger discovered an issue effecting the alpha, mips,
-    powerpc, s390 and sparc64 architectures that allows local users to
-    cause a denial of service or potentially gain elevated privileges.
+    Christian Borntraeger discovered an issue effecting the alpha,
+    mips, powerpc, s390 and sparc64 architectures that allows local
+    users to cause a denial of service or potentially gain elevated
+    privileges.
 
 CVE-2009-0031
 
-    Vegard Nossum discovered a memory leak in the keyctl subsystem that
-    allows local users to cause a denial of service by consuming all of
-    kernel memory.
+    Vegard Nossum discovered a memory leak in the keyctl subsystem
+    that allows local users to cause a denial of service by consuming
+    all of kernel memory.
 
 CVE-2009-0065
 
-    Wei Yongjun discovered a memory overflow in the SCTP implementation
-    that can be triggered by remote users.
+    Wei Yongjun discovered a memory overflow in the SCTP
+    implementation that can be triggered by remote users.
     
 CVE-2009-0269
 
-    Duane Griffin provided a fix for an issue in the eCryptfs subsystem
-    which allows local users to cause a denial of service (fault or
-    memory corruption).
+    Duane Griffin provided a fix for an issue in the eCryptfs
+    subsystem which allows local users to cause a denial of service
+    (fault or memory corruption).
 
 CVE-2009-0322
 
-    Pavel Roskin provided a fix for an issue in the dell_rbu driver that
-    allows a local user to cause a denial of service (oops) by reading 0
-    byts from a sysfs entry.
+    Pavel Roskin provided a fix for an issue in the dell_rbu driver
+    that allows a local user to cause a denial of service (oops) by
+    reading 0 byts from a sysfs entry.
 
 CVE-2009-0676
 
     Clément LECIGNE discovered a bug in the sock_getsockopt function
-    that may result in a leak sensitive kernel memory.
+    that may result in leaking sensitive kernel memory.
 
 CVE-2009-0675
 
@@ -58,33 +59,33 @@
 
 CVE-2009-0745
 
-    Peter Kerwien discovered an issue in the ext4 filesystem that allows
-    local users to cause a denial of service (kernel oops) during a resize
-    operation.
+    Peter Kerwien discovered an issue in the ext4 filesystem that
+    allows local users to cause a denial of service (kernel oops)
+    during a resize operation.
 
 CVE-2009-0746
 
     Sami Liedes reported an issue in the ext4 filesystem that allows
-    local users to cause a denial of service (kernel oops) when accessing
-    a specially crafted corrupt filesystem.
+    local users to cause a denial of service (kernel oops) when
+    accessing a specially crafted corrupt filesystem.
 
 CVE-2009-0747
 
-    David Maciejak reported an issue in the ext4 filesystem that allows
-    local users to cause a denial of service (kernel oops) when mounting
-    a specially crafted corrupt filesystem.
+    David Maciejak reported an issue in the ext4 filesystem that
+    allows local users to cause a denial of service (kernel oops) when
+    mounting a specially crafted corrupt filesystem.
 
 CVE-2009-0748
 
-    David Maciejak reported an additional issue in the ext4 filesystem that
-    allows local users to cause a denial of service (kernel oops) when
-    mounting a specially crafted corrupt filesystem.
+    David Maciejak reported an additional issue in the ext4 filesystem
+    that allows local users to cause a denial of service (kernel oops)
+    when mounting a specially crafted corrupt filesystem.
     
-For the stable distribution (lenny), these problems have been fixed
-in version 2.6.26-13lenny2.
+For the stable distribution (lenny), these problems have been fixed in
+version 2.6.26-13lenny2.
 
-For the oldstable distribution (etch), these problems will be fixed
-in a future update.
+For the oldstable distribution (etch), these problems will be fixed in
+a future update.
 
 We recommend that you upgrade your linux-2.6, fai-kernels, and
 user-mode-linux packages.




More information about the kernel-sec-discuss mailing list