summaryrefslogtreecommitdiffstats
path: root/dsa-texts/2.6.32-41squeeze2
diff options
context:
space:
mode:
authordann frazier <dannf@debian.org>2012-03-26 04:05:05 +0000
committerdann frazier <dannf@debian.org>2012-03-26 04:05:05 +0000
commit08f6e945e7080828b56a2bd16690cbe7bc3be403 (patch)
tree16497962ee03265d93e996ce5383088ffdb948de /dsa-texts/2.6.32-41squeeze2
parentb678d77eae14318b25f0ada207385fad6afcc064 (diff)
new text
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@2653 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'dsa-texts/2.6.32-41squeeze2')
-rw-r--r--dsa-texts/2.6.32-41squeeze269
1 files changed, 69 insertions, 0 deletions
diff --git a/dsa-texts/2.6.32-41squeeze2 b/dsa-texts/2.6.32-41squeeze2
new file mode 100644
index 00000000..08d32413
--- /dev/null
+++ b/dsa-texts/2.6.32-41squeeze2
@@ -0,0 +1,69 @@
+----------------------------------------------------------------------
+Debian Security Advisory DSA-XXXX-1 security@debian.org
+http://www.debian.org/security/ Dann Frazier
+March XX, 2012 http://www.debian.org/security/faq
+----------------------------------------------------------------------
+
+Package : linux-2.6
+Vulnerability : privilege escalation/denial of service/information leak
+Problem type : local/remote
+Debian-specific: no
+CVE Id(s) : CVE-2009-4307 CVE-2011-1833 CVE-2011-4127 CVE-2011-4347
+ CVE-2012-0045 CVE-2012-1090 CVE-2012-1097
+
+Several vulnerabilities have been discovered in the Linux kernel that may lead
+to a denial of service or privilege escalation. The Common Vulnerabilities and
+Exposures project identifies the following problems:
+
+CVE-2009-4307
+
+ Nageswara R Sastry reported an issue in the ext4 filesystem. Local users
+ with the privileges to mount a filesystem can cause a denial of service
+ (BUG) by providing a s_log_groups_per_flex value greater than 31.
+
+CVE-2011-1833
+
+ Vasiliy Kulikov of Openwall and Dan Rosenberg discovered an information
+ leak in the eCryptfs filesystem. Local users were able to mount arbitrary
+ directories.
+
+CVE-2011-4347
+
+ Sasha Levin reported an issue in the device assignment functionality
+ in KVM. Local users with permission to access /dev/kvm could assign
+ unused pci devices to a guest and cause a denial of service (crash).
+
+CVE-2012-0045
+
+ Stephan Barwolf reported an issue in KVM. Local users in a 32-bit
+ guest running on a 64-bit system can crash the guest with a syscall
+ instruction.
+
+CVE-2012-1090
+
+ CAI Qian reported an issue in the CIFS filesystem. A reference count
+ leak can occur during the lookup of special files, resulting in a
+ denial of service (oops) on umount.
+
+CVE-2012-1097
+
+ H. Peter Anvin reported an issue in the regset infrastructure. Local
+ users can cause a denial of service (NULL pointer dereference) by
+ triggering the write methods of readonly regsets.
+
+For the stable distribution (squeeze), this problem has been fixed in version
+2.6.32-41squeeze2.
+
+The following matrix lists additional source packages that were rebuilt for
+compatibility with or to take advantage of this update:
+
+ Debian 6.0 (squeeze)
+ user-mode-linux 2.6.32-1um-4+41squeeze2
+
+We recommend that you upgrade your linux-2.6 and user-mode-linux packages.
+
+Further information about Debian Security Advisories, how to apply
+these updates to your system and frequently asked questions can be
+found at: http://www.debian.org/security/
+
+Mailing list: debian-security-announce@lists.debian.org

© 2014-2024 Faster IT GmbH | imprint | privacy policy