[kernel-sec-discuss] r1751 - dsa-texts

Micah Anderson micah at alioth.debian.org
Sat Feb 27 16:37:24 UTC 2010


Author: micah
Date: 2010-02-27 16:37:23 +0000 (Sat, 27 Feb 2010)
New Revision: 1751

Modified:
   dsa-texts/2.6.24-6~etchnhalf.9etch3
Log:
maybe -> may be; Ethernet caps; and a justificaiton

Modified: dsa-texts/2.6.24-6~etchnhalf.9etch3
===================================================================
--- dsa-texts/2.6.24-6~etchnhalf.9etch3	2010-02-26 20:44:11 UTC (rev 1750)
+++ dsa-texts/2.6.24-6~etchnhalf.9etch3	2010-02-27 16:37:23 UTC (rev 1751)
@@ -15,10 +15,9 @@
                  CVE-2010-0415 CVE-2010-0622
 
 NOTE: This kernel update marks the final planned kernel security
-update for the 2.6.24 kernel in the Debian release 'etch'.
-Although security support for 'etch' officially ended on
-Feburary 15th, 2010, this update was already in preparation
-before that date.
+update for the 2.6.24 kernel in the Debian release 'etch'.  Although
+security support for 'etch' officially ended on Feburary 15th, 2010,
+this update was already in preparation before that date.
 
 Several vulnerabilities have been discovered in the Linux kernel that
 may lead to a denial of service, sensitive memory leak or privilege
@@ -28,7 +27,7 @@
 CVE-2009-2691
 
     Steve Beattie and Kees Cook reported an information leak in the
-    maps and smaps files available under /proc. Local users maybe
+    maps and smaps files available under /proc. Local users may be
     able to read this data for setuid processes while the ELF binary
     is being loaded.
 
@@ -86,15 +85,15 @@
 CVE-2009-4308
 
     Ted Ts'o discovered an issue in the ext4 filesystem that allows
-    local users to cause a denial of service (NULL pointer dereference).
-    For this to be exploitable, the local user must have sufficient
-    privileges to mount a filesystem.
+    local users to cause a denial of service (NULL pointer
+    dereference).  For this to be exploitable, the local user must
+    have sufficient privileges to mount a filesystem.
 
 CVE-2009-4536 & CVE-2009-4538
 
     Fabian Yamaguchi reported issues in the e1000 and e1000e drivers
     for Intel gigabit network adapters which allow remote users to
-    bypass packet filters using specially crafted ethernet frames.
+    bypass packet filters using specially crafted Ethernet frames.
     
 CVE-2010-0003
 




More information about the kernel-sec-discuss mailing list