diff options
author | dann frazier <dannf@debian.org> | 2011-05-23 20:32:18 +0000 |
---|---|---|
committer | dann frazier <dannf@debian.org> | 2011-05-23 20:32:18 +0000 |
commit | 42f4f452aa4a137664a4cef6faefd6b415e526fe (patch) | |
tree | 52ddd0e9d80525d730e6b4020784c25da33d6f01 | |
parent | f157d631b9bee50b09a50437414aceb0ed9c2c02 (diff) |
finalize
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@2328 e094ebfe-e918-0410-adfb-c712417f3574
-rw-r--r-- | dsa-texts/2.6.32-34squeeze1 | 56 |
1 files changed, 16 insertions, 40 deletions
diff --git a/dsa-texts/2.6.32-34squeeze1 b/dsa-texts/2.6.32-34squeeze1 index 1676f877..d47205fc 100644 --- a/dsa-texts/2.6.32-34squeeze1 +++ b/dsa-texts/2.6.32-34squeeze1 @@ -1,7 +1,7 @@ ---------------------------------------------------------------------- -Debian Security Advisory DSA-XXXX-1 security@debian.org +Debian Security Advisory DSA-2239-1 security@debian.org http://www.debian.org/security/ dann frazier -May 21, 2011 http://www.debian.org/security/faq +May 23, 2011 http://www.debian.org/security/faq ---------------------------------------------------------------------- Package : linux-2.6 @@ -47,7 +47,7 @@ CVE-2011-0726 CVE-2011-1016 - Marek Olšák discovered an issue in the driver for ATI/AMD Radeon video + Marek Olšák discovered an issue in the driver for ATI/AMD Radeon video chips. Local users could pass arbitrary values to video memory and the graphics translation table, resulting in denial of service or escalated privileges. On default Debian installations, this is exploitable only by @@ -239,50 +239,26 @@ CVE-2011-2022 to missing bounds checking in the AGPIOC_UNBIND ioctl. On default Debian installations, this is exploitable only by users in the video group. -This update also includes fixes a regression introduced by a previous -update. See the referenced Debian bug page for details. +This update also includes changes queued for the next point release of +Debian 6.0, which also fix various non-security issues. These additional +changes are described in the package changelog which can be viewed at: -For the stable distribution (lenny), this problem has been fixed in version -2.6.32-34squeeze1. + http://packages.debian.org/changelogs/pool/main/l/linux-2.6/linux-2.6_2.6.32-34/changelog -We recommend that you upgrade your linux-2.6 and user-mode-linux packages. +For the stable distribution (squeeze), this problem has been fixed in version +2.6.32-34squeeze1. Updates for issues impacting the oldstable distribution +(lenny) will be available soon. The following matrix lists additional source packages that were rebuilt for compatibility with or to take advantage of this update: - Debian 5.0 (lenny) - user-mode-linux 2.6.26-1um-2+24lenny1 - -Upgrade instructions --------------------- - -wget url - will fetch the file for you -dpkg -i file.deb - will install the referenced file. - -If you are using the apt-get package manager, use the line for -sources.list as given below: + Debian 6.0 (squeeze) + user-mode-linux 2.6.32-1um-4+34squeeze1 -apt-get update - will update the internal database -apt-get upgrade - will install corrected packages - -You may use an automated update by adding the resources from the -footer to the proper configuration. - -Debian GNU/Linux 6.0 alias squeeze ----------------------------------- - -Stable updates are available for alpha, amd64, armel, hppa, i386, ia64, mipsel, powerpc, s390 and sparc. -Updates for arm and mips will be released as they become available. +We recommend that you upgrade your linux-2.6 and user-mode-linux packages. - These files will probably be moved into the stable distribution on - its next update. +Further information about Debian Security Advisories, how to apply +these updates to your system and frequently asked questions can be +found at: http://www.debian.org/security/ ---------------------------------------------------------------------------------- -For apt-get: deb http://security.debian.org/ stable/updates main -For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org -Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> |