summaryrefslogtreecommitdiffstats
path: root/dsa-texts/2.6.26-26lenny4
diff options
context:
space:
mode:
authorMicah Anderson <micah@debian.org>2011-09-20 15:06:45 +0000
committerMicah Anderson <micah@debian.org>2011-09-20 15:06:45 +0000
commitc4b4166824a9703eaa17713c31fbea2dd0dc6c9d (patch)
tree8f0d7b355e00898b015cda6cb8465ac229a422dd /dsa-texts/2.6.26-26lenny4
parent6e690ea60fbb9cf4e36895430b5a7349998bb944 (diff)
update dsa text to get rid of asterisks, fix a missing word and format
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@2500 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'dsa-texts/2.6.26-26lenny4')
-rw-r--r--dsa-texts/2.6.26-26lenny428
1 files changed, 14 insertions, 14 deletions
diff --git a/dsa-texts/2.6.26-26lenny4 b/dsa-texts/2.6.26-26lenny4
index fe45b3eb..89c931b4 100644
--- a/dsa-texts/2.6.26-26lenny4
+++ b/dsa-texts/2.6.26-26lenny4
@@ -18,14 +18,14 @@ Several vulnerabilities have been discovered in the Linux kernel that may lead
to a privilege escalation, denial of service or information leak. The Common
Vulnerabilities and Exposures project identifies the following problems:
-[*]CVE-2009-4067
+CVE-2009-4067
- Rafael Dominguez Vega of MWR InfoSecurity reported an issue in auerswald
- module, a driver for Auerswald PBX/System Telephone USB devices.
- Attackers with physical access to a system's USB ports could obtain
- elevated privileges using a specially crafted USB device.
+ Rafael Dominguez Vega of MWR InfoSecurity reported an issue in the auerswald
+ module, a driver for Auerswald PBX/System Telephone USB devices. Attackers
+ with physical access to a system's USB ports could obtain elevated
+ privileges using a specially crafted USB device.
-[*]CVE-2011-0712
+CVE-2011-0712
Rafael Dominguez Vega of MWR InfoSecurity reported an issue in the caiaq
module, a USB driver for Native Instruments USB audio devices. Attackers
@@ -38,18 +38,18 @@ CVE-2011-1020
users to gain access to sensitive process information after execution of a
setuid binary.
-[*]CVE-2011-2209
+CVE-2011-2209
- Dan Rosenberg discovered an issue in the osf_sysinfo() system call on
- the alpha architecture. Local users could obtain access to sensitive
- kernel memory.
+ Dan Rosenberg discovered an issue in the osf_sysinfo() system call on the
+ alpha architecture. Local users could obtain access to sensitive kernel
+ memory.
-[*]CVE-2011-2211
+CVE-2011-2211
Dan Rosenberg discovered an issue in the osf_wait4() system call on the
alpha architecture permitting local users to gain elevated privileges.
-[*]CVE-2011-2213
+CVE-2011-2213
Dan Rosenberg discovered an issue in the INET socket monitoring interface.
Local users could cause a denial of service by injecting code and causing
@@ -116,8 +116,8 @@ CVE-2011-3191
This update also includes a fix for a regression introduced with the previous
security fix for CVE-2011-1768 (Debian: #633738)
-For the oldstable distribution (lenny), this problem has been fixed in
-version 2.6.26-26lenny4.
+For the oldstable distribution (lenny), this problem has been fixed in version
+2.6.26-26lenny4.
The following matrix lists additional source packages that were rebuilt for
compatibility with or to take advantage of this update:

© 2014-2024 Faster IT GmbH | imprint | privacy policy