[kernel-sec-discuss] r1545 - dsa-texts

Dann Frazier dannf at alioth.debian.org
Fri Oct 23 00:06:15 UTC 2009


Author: dannf
Date: 2009-10-23 00:05:51 +0000 (Fri, 23 Oct 2009)
New Revision: 1545

Modified:
   dsa-texts/2.6.26-19lenny1
Log:
reference mmap_min_addr wiki, move "other packages" section as requested by web team

Modified: dsa-texts/2.6.26-19lenny1
===================================================================
--- dsa-texts/2.6.26-19lenny1	2009-10-22 21:58:42 UTC (rev 1544)
+++ dsa-texts/2.6.26-19lenny1	2009-10-23 00:05:51 UTC (rev 1545)
@@ -1,7 +1,7 @@
 ----------------------------------------------------------------------
-Debian Security Advisory DSA-XXXX-1                security at debian.org
+Debian Security Advisory DSA-1915-1                security at debian.org
 http://www.debian.org/security/                           dann frazier
-October 21, 2009                    http://www.debian.org/security/faq
+October 22, 2009                    http://www.debian.org/security/faq
 ----------------------------------------------------------------------
 
 Package        : linux-2.6
@@ -12,6 +12,16 @@
                  CVE-2009-2910 CVE-2009-3001 CVE-2009-3002 CVE-2009-3286
                  CVE-2009-3290 CVE-2009-3613
 
+Notice: Debian 5.0.4, the next point release of Debian 'lenny',
+will include a new default value for the mmap_min_addr tunable.
+This change will add an additional safeguard against a class of security
+vulnerabilities known as "NULL pointer dereference" vulnerabilities, but
+it will need to be overridden when using certain applications.
+Additional information about this change, including instructions for
+making this change locally in advance of 5.0.4 (recommended), can be
+found at:
+  http://wiki.debian.org/mmap_min_addr
+
 Several vulnerabilities have been discovered in the Linux kernel that
 may lead to a denial of service, sensitive memory leak or privilege escalation.
 The Common Vulnerabilities and Exposures project identifies the following
@@ -23,14 +33,6 @@
     provided by the mmap_min_addr tunable against NULL pointer
     dereference vulnerabilities.
 
-    Unless your system needs to run applications that require mapping
-    low addresses (such as wine or dosemu), it is recommended to
-    increase the value of mmap_min_addr to protect against NULL
-    pointer exploits.  This can be configured using the procps
-    package:
-      # echo "vm.mmap_min_addr = 32768" > /etc/sysctl.d/mmap_min_addr.conf
-      # /etc/init.d/procps restart
-
 CVE-2009-2903
 
     Mark Smith discovered a memory leak in the appletalk
@@ -107,6 +109,12 @@
 be released for all kernels at the same time. Rather, they will be
 released in a staggered or "leap-frog" fashion.
 
+The following matrix lists additional source packages that were rebuilt for
+compatibility with or to take advantage of this update:
+
+                                             Debian 5.0 (lenny)
+     user-mode-linux                         2.6.26-1um-2+19lenny1
+
 Upgrade instructions
 --------------------
 
@@ -123,12 +131,6 @@
 apt-get upgrade
         will install corrected packages
 
-The following matrix lists additional source packages that were rebuilt for
-compatibility with or to take advantage of this update:
-
-                                             Debian 5.0 (lenny)
-     user-mode-linux                         2.6.26-1um-2+19lenny1
-
 You may use an automated update by adding the resources from the
 footer to the proper configuration.
 




More information about the kernel-sec-discuss mailing list