summaryrefslogtreecommitdiffstats
path: root/dsa-texts/2.6.24-6~etchnhalf.7
diff options
context:
space:
mode:
authorMicah Anderson <micah@debian.org>2008-12-03 17:23:20 +0000
committerMicah Anderson <micah@debian.org>2008-12-03 17:23:20 +0000
commit0a210dcb1918f31d5368c5cd0292729942a0ecf5 (patch)
tree2cf30cd3ae2eb83af97d386753c7607a250c648a /dsa-texts/2.6.24-6~etchnhalf.7
parent42b58400ab63a59d5249229e93df8a28b470df36 (diff)
fixed missing character, changed some words to reduce the redundancy
and justified the paragraphs git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1271 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'dsa-texts/2.6.24-6~etchnhalf.7')
-rw-r--r--dsa-texts/2.6.24-6~etchnhalf.765
1 files changed, 36 insertions, 29 deletions
diff --git a/dsa-texts/2.6.24-6~etchnhalf.7 b/dsa-texts/2.6.24-6~etchnhalf.7
index 2ef4c751..763d7899 100644
--- a/dsa-texts/2.6.24-6~etchnhalf.7
+++ b/dsa-texts/2.6.24-6~etchnhalf.7
@@ -14,25 +14,29 @@ CVE Id(s) : CVE-2008-3528 CVE-2008-4554 CVE-2008-4576 CVE-2008-4618
Several vulnerabilities have been discovered in the Linux kernel that
may lead to a denial of service or privilege escalation. The Common
-Vulnerabilities and Exposures project identifies the following problems:
+Vulnerabilities and Exposures project identifies the following
+problems:
CVE-2008-3528
- Eugene Teo reported a local DoS issue in the ext2 and ext3 filesystems.
- Local users who have been granted the privileges necessary to mount
- a filesystem would be able to craft a corrupted filesystem that
- causes the kernel to output error messages in an infinit loop.
+ Eugene Teo reported a local DoS issue in the ext2 and ext3
+ filesystems. Local users who have been granted the privileges
+ necessary to mount a filesystem would be able to craft a corrupted
+ filesystem that causes the kernel to output error messages in an
+ infinite loop.
CVE-2008-4554
Milos Szeredi reported that the usage of splice() on files opened
- with O_APPEND allows users to write to the file at arbitrary offsets,
- allowing a bypass of possible assumed semantics of the O_APPEND flag.
+ with O_APPEND allows users to write to the file at arbitrary
+ offsets, enabling a bypass of possible assumed semantics of the
+ O_APPEND flag.
CVE-2008-4576
- Vlad Yasevich reported an issue in the SCTP subsystem that may allow
- remote users to cause a local DoS by triggering a kernel oops.
+ Vlad Yasevich reported an issue in the SCTP subsystem that may
+ allow remote users to cause a local DoS by triggering a kernel
+ oops.
CVE-2008-4618
@@ -41,36 +45,38 @@ CVE-2008-4618
CVE-2008-4933
- Eric Sesterhenn reported a local DoS issue in the hfsplus filesystem.
- Local users who have been granted the privileges necessary to mount
- a filesystem would be able to craft a corrupted filesystem that
- causes the kernel to overrun a buffer, resulting in a system oops or
- memory corruption.
+ Eric Sesterhenn reported a local DoS issue in the hfsplus
+ filesystem. Local users who have been granted the privileges
+ necessary to mount a filesystem would be able to craft a corrupted
+ filesystem that causes the kernel to overrun a buffer, resulting
+ in a system oops or memory corruption.
CVE-2008-4934
- Eric Sesterhenn reported a local DoS issue in the hfsplus filesystem.
- Local users who have been granted the privileges necessary to mount
- a filesystem would be able to craft a corrupted filesystem that
- results in a kernel oops.
+ Eric Sesterhenn reported a local DoS issue in the hfsplus
+ filesystem. Local users who have been granted the privileges
+ necessary to mount a filesystem would be able to craft a corrupted
+ filesystem that results in a kernel oops.
CVE-2008-5025
Eric Sesterhenn reported a local DoS issue in the hfs filesystem.
- Local users who have been granted the privileges necessary to mount
- a filesystem would be able to craft a filesystem with a corrupted
- catalog name length, resulting in a system oops or memory corruption.
+ Local users who have been granted the privileges necessary to
+ mount a filesystem would be able to craft a filesystem with a
+ corrupted catalog name length, resulting in a system oops or
+ memory corruption.
CVE-2008-5029
- Andrea Bittau reported a DoS issue in the unix socket subsystem that
- allows a local user to cause memory corruption, resulting in a kernel
- panic.
+ Andrea Bittau reported a DoS issue in the unix socket subsystem
+ that allows a local user to cause memory corruption, resulting in
+ a kernel panic.
CVE-2008-5134
- Johannes Berg reported a remote DoS issue in the libertas wireless driver,
- which can be caused by a specially crafted beacon/probe response.
+ Johannes Berg reported a remote DoS issue in the libertas wireless
+ driver, which can be triggered by a specially crafted beacon/probe
+ response.
CVE-2008-5182
@@ -79,9 +85,10 @@ CVE-2008-5182
CVE-2008-5300
- dann frazier reported a DoS condition that allows local users to cause
- the out of memory handler to kill off privileged processes or trigger
- soft lockups due to a starvation issue in the unix socket subsystem.
+ Dann Frazier reported a DoS condition that allows local users to
+ cause the out of memory handler to kill off privileged processes
+ or trigger soft lockups due to a starvation issue in the unix
+ socket subsystem.
For the stable distribution (etch), these problems have been fixed in
version 2.6.24-6~etchnhalf.7.

© 2014-2024 Faster IT GmbH | imprint | privacy policy