Your message dated Sun, 26 Jul 2009 23:45:59 +0200
with message-id <20090726214559.ga17...@galadriel.inutil.org>
and subject line Fixed
has caused the Debian Bug report #532722,
regarding linux-2.6: CVE-2009-1914 local dos in /proc/iomem on sparc
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
532722: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=532722
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: linux-2.6
Version: FILLINAFFECTEDVERSION
Severity: important
Tags: security , patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for linux-2.6.

CVE-2009-1914[0]:
| The pci_register_iommu_region function in
| arch/sparc/kernel/pci_common.c in the Linux kernel before 2.6.29 on
| the sparc64 platform allows local users to cause a denial of service
| (system crash) by reading the /proc/iomem file, related to
| uninitialized pointers and the request_resource function.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

Patches available [1].

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1914
    http://security-tracker.debian.net/tracker/CVE-2009-1914
[1] 
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=192d7a4667c6d11d1a174ec4cad9a3c5d5f9043c



--- End Message ---
--- Begin Message ---
Version: 2.6.29-1


--- End Message ---

Reply via email to