summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authordann frazier <dannf@debian.org>2007-10-12 23:51:59 +0000
committerdann frazier <dannf@debian.org>2007-10-12 23:51:59 +0000
commitf57c1175adcb02f072b7d91cea23905b039dbe58 (patch)
tree76c8d4dddc9b419cb919a55ea03508f092a1af90
parent489aed368f14aae5dab3ed99756f68fd78803831 (diff)
add grammar cleanups and compatability matrix
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@997 e094ebfe-e918-0410-adfb-c712417f3574
-rw-r--r--dsa-texts/2.6.18.dfsg.1-13etch412
1 files changed, 10 insertions, 2 deletions
diff --git a/dsa-texts/2.6.18.dfsg.1-13etch4 b/dsa-texts/2.6.18.dfsg.1-13etch4
index 10f2b1c4..811ac144 100644
--- a/dsa-texts/2.6.18.dfsg.1-13etch4
+++ b/dsa-texts/2.6.18.dfsg.1-13etch4
@@ -22,7 +22,7 @@ CVE-2006-5755
flavour kernel. The stable distribution ('etch') was not believed to
be vulnerable to this issue at the time of release, however Bastian
Blank discovered that this issue still applied to the 'xen-amd64' and
- 'xen-vserver-amd64' flavours that is resolved by this DSA.
+ 'xen-vserver-amd64' flavours, and is resolved by this DSA.
CVE-2007-4133
@@ -32,7 +32,7 @@ CVE-2007-4133
CVE-2007-4573
- Wojciech Purczynski discovered a vulnerability that can be exploitd
+ Wojciech Purczynski discovered a vulnerability that can be exploited
by a local user to obtain superuser privileges on x86_64 systems.
This resulted from improper clearing of the high bits of registers
during ia32 system call emulation. This vulnerability is relevant
@@ -61,6 +61,14 @@ This is an update to DSA-1381-1 which included only amd64 binaries for
linux-2.6. Builds for all other architectures are now available, as well as
rebuilds of ancillary packages that make use of the included linux source.
+The following matrix lists additional packages that were rebuilt for
+compatability with or to take advantage of this update:
+
+ Debian 4.0 (etch)
+ fai-kernels 1.17+etch.13etch4
+ kernel-patch-openvz 028.18.1etch5
+ user-mode-linux 2.6.18-1um-2etch.13etch4
+
We recommend that you upgrade your kernel package immediately and reboot
the machine. If you have built a custom kernel from the kernel source
package, you will need to rebuild to take advantage of these fixes.

© 2014-2024 Faster IT GmbH | imprint | privacy policy