summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authordann frazier <dannf@debian.org>2011-05-23 20:32:18 +0000
committerdann frazier <dannf@debian.org>2011-05-23 20:32:18 +0000
commit42f4f452aa4a137664a4cef6faefd6b415e526fe (patch)
tree52ddd0e9d80525d730e6b4020784c25da33d6f01
parentf157d631b9bee50b09a50437414aceb0ed9c2c02 (diff)
finalize
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@2328 e094ebfe-e918-0410-adfb-c712417f3574
-rw-r--r--dsa-texts/2.6.32-34squeeze156
1 files changed, 16 insertions, 40 deletions
diff --git a/dsa-texts/2.6.32-34squeeze1 b/dsa-texts/2.6.32-34squeeze1
index 1676f877..d47205fc 100644
--- a/dsa-texts/2.6.32-34squeeze1
+++ b/dsa-texts/2.6.32-34squeeze1
@@ -1,7 +1,7 @@
----------------------------------------------------------------------
-Debian Security Advisory DSA-XXXX-1 security@debian.org
+Debian Security Advisory DSA-2239-1 security@debian.org
http://www.debian.org/security/ dann frazier
-May 21, 2011 http://www.debian.org/security/faq
+May 23, 2011 http://www.debian.org/security/faq
----------------------------------------------------------------------
Package : linux-2.6
@@ -47,7 +47,7 @@ CVE-2011-0726
CVE-2011-1016
- Marek Olšák discovered an issue in the driver for ATI/AMD Radeon video
+ Marek Olšák discovered an issue in the driver for ATI/AMD Radeon video
chips. Local users could pass arbitrary values to video memory and the
graphics translation table, resulting in denial of service or escalated
privileges. On default Debian installations, this is exploitable only by
@@ -239,50 +239,26 @@ CVE-2011-2022
to missing bounds checking in the AGPIOC_UNBIND ioctl. On default Debian
installations, this is exploitable only by users in the video group.
-This update also includes fixes a regression introduced by a previous
-update. See the referenced Debian bug page for details.
+This update also includes changes queued for the next point release of
+Debian 6.0, which also fix various non-security issues. These additional
+changes are described in the package changelog which can be viewed at:
-For the stable distribution (lenny), this problem has been fixed in version
-2.6.32-34squeeze1.
+ http://packages.debian.org/changelogs/pool/main/l/linux-2.6/linux-2.6_2.6.32-34/changelog
-We recommend that you upgrade your linux-2.6 and user-mode-linux packages.
+For the stable distribution (squeeze), this problem has been fixed in version
+2.6.32-34squeeze1. Updates for issues impacting the oldstable distribution
+(lenny) will be available soon.
The following matrix lists additional source packages that were rebuilt for
compatibility with or to take advantage of this update:
- Debian 5.0 (lenny)
- user-mode-linux 2.6.26-1um-2+24lenny1
-
-Upgrade instructions
---------------------
-
-wget url
- will fetch the file for you
-dpkg -i file.deb
- will install the referenced file.
-
-If you are using the apt-get package manager, use the line for
-sources.list as given below:
+ Debian 6.0 (squeeze)
+ user-mode-linux 2.6.32-1um-4+34squeeze1
-apt-get update
- will update the internal database
-apt-get upgrade
- will install corrected packages
-
-You may use an automated update by adding the resources from the
-footer to the proper configuration.
-
-Debian GNU/Linux 6.0 alias squeeze
-----------------------------------
-
-Stable updates are available for alpha, amd64, armel, hppa, i386, ia64, mipsel, powerpc, s390 and sparc.
-Updates for arm and mips will be released as they become available.
+We recommend that you upgrade your linux-2.6 and user-mode-linux packages.
- These files will probably be moved into the stable distribution on
- its next update.
+Further information about Debian Security Advisories, how to apply
+these updates to your system and frequently asked questions can be
+found at: http://www.debian.org/security/
----------------------------------------------------------------------------------
-For apt-get: deb http://security.debian.org/ stable/updates main
-For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
-Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

© 2014-2024 Faster IT GmbH | imprint | privacy policy