[kernel-sec-discuss] r1751 - dsa-texts
Micah Anderson
micah at alioth.debian.org
Sat Feb 27 16:37:24 UTC 2010
Author: micah
Date: 2010-02-27 16:37:23 +0000 (Sat, 27 Feb 2010)
New Revision: 1751
Modified:
dsa-texts/2.6.24-6~etchnhalf.9etch3
Log:
maybe -> may be; Ethernet caps; and a justificaiton
Modified: dsa-texts/2.6.24-6~etchnhalf.9etch3
===================================================================
--- dsa-texts/2.6.24-6~etchnhalf.9etch3 2010-02-26 20:44:11 UTC (rev 1750)
+++ dsa-texts/2.6.24-6~etchnhalf.9etch3 2010-02-27 16:37:23 UTC (rev 1751)
@@ -15,10 +15,9 @@
CVE-2010-0415 CVE-2010-0622
NOTE: This kernel update marks the final planned kernel security
-update for the 2.6.24 kernel in the Debian release 'etch'.
-Although security support for 'etch' officially ended on
-Feburary 15th, 2010, this update was already in preparation
-before that date.
+update for the 2.6.24 kernel in the Debian release 'etch'. Although
+security support for 'etch' officially ended on Feburary 15th, 2010,
+this update was already in preparation before that date.
Several vulnerabilities have been discovered in the Linux kernel that
may lead to a denial of service, sensitive memory leak or privilege
@@ -28,7 +27,7 @@
CVE-2009-2691
Steve Beattie and Kees Cook reported an information leak in the
- maps and smaps files available under /proc. Local users maybe
+ maps and smaps files available under /proc. Local users may be
able to read this data for setuid processes while the ELF binary
is being loaded.
@@ -86,15 +85,15 @@
CVE-2009-4308
Ted Ts'o discovered an issue in the ext4 filesystem that allows
- local users to cause a denial of service (NULL pointer dereference).
- For this to be exploitable, the local user must have sufficient
- privileges to mount a filesystem.
+ local users to cause a denial of service (NULL pointer
+ dereference). For this to be exploitable, the local user must
+ have sufficient privileges to mount a filesystem.
CVE-2009-4536 & CVE-2009-4538
Fabian Yamaguchi reported issues in the e1000 and e1000e drivers
for Intel gigabit network adapters which allow remote users to
- bypass packet filters using specially crafted ethernet frames.
+ bypass packet filters using specially crafted Ethernet frames.
CVE-2010-0003
More information about the kernel-sec-discuss
mailing list