diff options
author | dann frazier <dannf@debian.org> | 2007-10-12 23:51:59 +0000 |
---|---|---|
committer | dann frazier <dannf@debian.org> | 2007-10-12 23:51:59 +0000 |
commit | f57c1175adcb02f072b7d91cea23905b039dbe58 (patch) | |
tree | 76c8d4dddc9b419cb919a55ea03508f092a1af90 | |
parent | 489aed368f14aae5dab3ed99756f68fd78803831 (diff) |
add grammar cleanups and compatability matrix
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@997 e094ebfe-e918-0410-adfb-c712417f3574
-rw-r--r-- | dsa-texts/2.6.18.dfsg.1-13etch4 | 12 |
1 files changed, 10 insertions, 2 deletions
diff --git a/dsa-texts/2.6.18.dfsg.1-13etch4 b/dsa-texts/2.6.18.dfsg.1-13etch4 index 10f2b1c4..811ac144 100644 --- a/dsa-texts/2.6.18.dfsg.1-13etch4 +++ b/dsa-texts/2.6.18.dfsg.1-13etch4 @@ -22,7 +22,7 @@ CVE-2006-5755 flavour kernel. The stable distribution ('etch') was not believed to be vulnerable to this issue at the time of release, however Bastian Blank discovered that this issue still applied to the 'xen-amd64' and - 'xen-vserver-amd64' flavours that is resolved by this DSA. + 'xen-vserver-amd64' flavours, and is resolved by this DSA. CVE-2007-4133 @@ -32,7 +32,7 @@ CVE-2007-4133 CVE-2007-4573 - Wojciech Purczynski discovered a vulnerability that can be exploitd + Wojciech Purczynski discovered a vulnerability that can be exploited by a local user to obtain superuser privileges on x86_64 systems. This resulted from improper clearing of the high bits of registers during ia32 system call emulation. This vulnerability is relevant @@ -61,6 +61,14 @@ This is an update to DSA-1381-1 which included only amd64 binaries for linux-2.6. Builds for all other architectures are now available, as well as rebuilds of ancillary packages that make use of the included linux source. +The following matrix lists additional packages that were rebuilt for +compatability with or to take advantage of this update: + + Debian 4.0 (etch) + fai-kernels 1.17+etch.13etch4 + kernel-patch-openvz 028.18.1etch5 + user-mode-linux 2.6.18-1um-2etch.13etch4 + We recommend that you upgrade your kernel package immediately and reboot the machine. If you have built a custom kernel from the kernel source package, you will need to rebuild to take advantage of these fixes. |