[kernel-sec-discuss] r2818 - dsa-texts

Dann Frazier dannf at alioth.debian.org
Sun Feb 24 22:44:42 UTC 2013


Author: dannf
Date: 2013-02-24 22:44:21 +0000 (Sun, 24 Feb 2013)
New Revision: 2818

Added:
   dsa-texts/2.6.32-48squeeze1
Log:
new text


Added: dsa-texts/2.6.32-48squeeze1
===================================================================
--- dsa-texts/2.6.32-48squeeze1	                        (rev 0)
+++ dsa-texts/2.6.32-48squeeze1	2013-02-24 22:44:21 UTC (rev 2818)
@@ -0,0 +1,46 @@
+----------------------------------------------------------------------
+Debian Security Advisory DSA-XXXX-1                security at debian.org
+http://www.debian.org/security/                           Dann Frazier
+February 25, 2013                   http://www.debian.org/security/faq
+----------------------------------------------------------------------
+
+Package        : linux-2.6
+Vulnerability  : privilege escalation/denial of service
+Problem type   : local
+Debian-specific: no
+CVE Id(s)      : CVE-2013-0231 CVE-2013-0871
+
+Several vulnerabilities have been discovered in the Linux kernel that may lead
+to a denial of service or privilege escalation. The Common Vulnerabilities and
+Exposures project identifies the following problems:
+
+CVE-2013-0231
+
+    Jan Beulich provided a fix for an issue in the Xen PCI backend drivers.
+    Users of guests on a system using passed-through PCI devices can create
+    a denial of service of the host system due to the use of non-ratelimited
+    kernel log messages.
+
+CVE-2013-0871
+
+    Suleiman Souhlal and Salman Qazi of Google, with help from Aaron Durbin
+    and Michael Davidson of Google, discovered an issue in the
+    ptrace subsystem. Due to a race condition with PTRACE_SETREGS, local users
+    can cause kernel stack corruption and execution of arbitrary code.
+
+For the stable distribution (squeeze), this problem has been fixed in version
+2.6.32-48squeeze1.
+
+The following matrix lists additional source packages that were rebuilt for
+compatibility with or to take advantage of this update:
+
+                                             Debian 6.0 (squeeze)
+     user-mode-linux                         2.6.32-1um-4+48squeeze1
+
+We recommend that you upgrade your linux-2.6 and user-mode-linux packages.
+
+Further information about Debian Security Advisories, how to apply
+these updates to your system and frequently asked questions can be
+found at: http://www.debian.org/security/
+
+Mailing list: debian-security-announce at lists.debian.org




More information about the kernel-sec-discuss mailing list