[kernel-sec-discuss] r1279 - dsa-texts

micah at alioth.debian.org micah at alioth.debian.org
Mon Dec 15 21:21:48 UTC 2008


Author: micah
Date: 2008-12-15 21:21:48 +0000 (Mon, 15 Dec 2008)
New Revision: 1279

Modified:
   dsa-texts/2.6.18.dfsg.1-23etch1
Log:
some minor formatting tweaks


Modified: dsa-texts/2.6.18.dfsg.1-23etch1
===================================================================
--- dsa-texts/2.6.18.dfsg.1-23etch1	2008-12-14 23:47:46 UTC (rev 1278)
+++ dsa-texts/2.6.18.dfsg.1-23etch1	2008-12-15 21:21:48 UTC (rev 1279)
@@ -19,8 +19,9 @@
 
 CVE-2008-3527
 
-    Tavis Ormandy reported a local DoS and potential privilege escalation
-    in the Virtual Dynamic Shared Objects (vDSO) implementation.
+    Tavis Ormandy reported a local DoS and potential privilege
+    escalation in the Virtual Dynamic Shared Objects (vDSO)
+    implementation.
 
 CVE-2008-3528
 
@@ -75,9 +76,9 @@
 
 CVE-2008-5079
 
-    Hugo Dias reported a DoS condition in the ATM subsystem
-    that can be triggered by a local user by calling the svc_listen
-    function twice on the same socket and reading /proc/net/atm/*vc.
+    Hugo Dias reported a DoS condition in the ATM subsystem that can
+    be triggered by a local user by calling the svc_listen function
+    twice on the same socket and reading /proc/net/atm/*vc.
 
 CVE_2008-5182
 
@@ -98,13 +99,13 @@
 user-mode-linux packages.
 
 Note: Debian 'etch' includes linux kernel packages based upon both the
-2.6.18 and 2.6.24 linux releases.  All known security issues are carefully
-tracked against both packages and both packages will receive security
-updates until security support for Debian 'etch' concludes. However, given
-the high frequency at which low-severity security issues are discovered in
-the kernel and the resource requirements of doing an update, lower severity
-2.6.18 and 2.6.24 updates will typically release in a staggered or "leap-frog"
-fashion.
+2.6.18 and 2.6.24 linux releases.  All known security issues are
+carefully tracked against both packages and both packages will receive
+security updates until security support for Debian 'etch'
+concludes. However, given the high frequency at which low-severity
+security issues are discovered in the kernel and the resource
+requirements of doing an update, lower severity 2.6.18 and 2.6.24
+updates will typically release in a staggered or "leap-frog" fashion.
 
 Upgrade instructions
 --------------------




More information about the kernel-sec-discuss mailing list