[kernel-sec-discuss] r1313 - dsa-texts
micah at alioth.debian.org
micah at alioth.debian.org
Thu Mar 19 20:53:21 UTC 2009
Author: micah
Date: 2009-03-19 20:53:21 +0000 (Thu, 19 Mar 2009)
New Revision: 1313
Modified:
dsa-texts/2.6.26-13lenny2
Log:
minor formatting tweaks and put in a missing word
Modified: dsa-texts/2.6.26-13lenny2
===================================================================
--- dsa-texts/2.6.26-13lenny2 2009-03-19 20:38:16 UTC (rev 1312)
+++ dsa-texts/2.6.26-13lenny2 2009-03-19 20:53:21 UTC (rev 1313)
@@ -19,37 +19,38 @@
CVE-2009-0029
- Christian Borntraeger discovered an issue effecting the alpha, mips,
- powerpc, s390 and sparc64 architectures that allows local users to
- cause a denial of service or potentially gain elevated privileges.
+ Christian Borntraeger discovered an issue effecting the alpha,
+ mips, powerpc, s390 and sparc64 architectures that allows local
+ users to cause a denial of service or potentially gain elevated
+ privileges.
CVE-2009-0031
- Vegard Nossum discovered a memory leak in the keyctl subsystem that
- allows local users to cause a denial of service by consuming all of
- kernel memory.
+ Vegard Nossum discovered a memory leak in the keyctl subsystem
+ that allows local users to cause a denial of service by consuming
+ all of kernel memory.
CVE-2009-0065
- Wei Yongjun discovered a memory overflow in the SCTP implementation
- that can be triggered by remote users.
+ Wei Yongjun discovered a memory overflow in the SCTP
+ implementation that can be triggered by remote users.
CVE-2009-0269
- Duane Griffin provided a fix for an issue in the eCryptfs subsystem
- which allows local users to cause a denial of service (fault or
- memory corruption).
+ Duane Griffin provided a fix for an issue in the eCryptfs
+ subsystem which allows local users to cause a denial of service
+ (fault or memory corruption).
CVE-2009-0322
- Pavel Roskin provided a fix for an issue in the dell_rbu driver that
- allows a local user to cause a denial of service (oops) by reading 0
- byts from a sysfs entry.
+ Pavel Roskin provided a fix for an issue in the dell_rbu driver
+ that allows a local user to cause a denial of service (oops) by
+ reading 0 byts from a sysfs entry.
CVE-2009-0676
Clément LECIGNE discovered a bug in the sock_getsockopt function
- that may result in a leak sensitive kernel memory.
+ that may result in leaking sensitive kernel memory.
CVE-2009-0675
@@ -58,33 +59,33 @@
CVE-2009-0745
- Peter Kerwien discovered an issue in the ext4 filesystem that allows
- local users to cause a denial of service (kernel oops) during a resize
- operation.
+ Peter Kerwien discovered an issue in the ext4 filesystem that
+ allows local users to cause a denial of service (kernel oops)
+ during a resize operation.
CVE-2009-0746
Sami Liedes reported an issue in the ext4 filesystem that allows
- local users to cause a denial of service (kernel oops) when accessing
- a specially crafted corrupt filesystem.
+ local users to cause a denial of service (kernel oops) when
+ accessing a specially crafted corrupt filesystem.
CVE-2009-0747
- David Maciejak reported an issue in the ext4 filesystem that allows
- local users to cause a denial of service (kernel oops) when mounting
- a specially crafted corrupt filesystem.
+ David Maciejak reported an issue in the ext4 filesystem that
+ allows local users to cause a denial of service (kernel oops) when
+ mounting a specially crafted corrupt filesystem.
CVE-2009-0748
- David Maciejak reported an additional issue in the ext4 filesystem that
- allows local users to cause a denial of service (kernel oops) when
- mounting a specially crafted corrupt filesystem.
+ David Maciejak reported an additional issue in the ext4 filesystem
+ that allows local users to cause a denial of service (kernel oops)
+ when mounting a specially crafted corrupt filesystem.
-For the stable distribution (lenny), these problems have been fixed
-in version 2.6.26-13lenny2.
+For the stable distribution (lenny), these problems have been fixed in
+version 2.6.26-13lenny2.
-For the oldstable distribution (etch), these problems will be fixed
-in a future update.
+For the oldstable distribution (etch), these problems will be fixed in
+a future update.
We recommend that you upgrade your linux-2.6, fai-kernels, and
user-mode-linux packages.
More information about the kernel-sec-discuss
mailing list