diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2011-09-01 21:04:26 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2011-09-01 21:04:26 +0000 |
commit | ceadc2da21b0c4d62094b25e3a1674ebe85b1475 (patch) | |
tree | ba005e372f8e169b2ea2080b5ace06a4d5c4ef86 /dsa-texts/2.6.32-35squeeze1 | |
parent | eb3219ae94e3c10a6d762255614724d0b8f7b46c (diff) |
initial updates
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@2472 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'dsa-texts/2.6.32-35squeeze1')
-rw-r--r-- | dsa-texts/2.6.32-35squeeze1 | 9 |
1 files changed, 7 insertions, 2 deletions
diff --git a/dsa-texts/2.6.32-35squeeze1 b/dsa-texts/2.6.32-35squeeze1 index a15de0b49..2e631e3d7 100644 --- a/dsa-texts/2.6.32-35squeeze1 +++ b/dsa-texts/2.6.32-35squeeze1 @@ -28,7 +28,9 @@ CVE-2011-1576 CVE-2011-2484 - foo + Vasiliy Kulikov of Openwall discovered that the amount of exit handler + that a process can register is not capped, resulting in local denial of + service through resource exhaustion (cpu time and memory). CVE-2011-2491 @@ -52,7 +54,10 @@ CVE-2011-2497 CVE-2011-2517 - foo + It was discovered that the netlink-based wireless configuration + interface performed insufficient length validation when parsing + SSIDs, resulting in buffer overflows. Local users with the + CAP_NET_ADMIN capability can cause a denial of service. CVE-2011-2525 |