diff options
author | Micah Anderson <micah@debian.org> | 2008-12-15 21:21:48 +0000 |
---|---|---|
committer | Micah Anderson <micah@debian.org> | 2008-12-15 21:21:48 +0000 |
commit | 263bf77409de7d802e9b8d374b950e921a30bff7 (patch) | |
tree | bc8f74aac44828b8f2c55d5e7afbc516d2804b35 /dsa-texts/2.6.18.dfsg.1-23etch1 | |
parent | bc3c097a89bc8e9e7fb167472b255aeeb6eb7d6d (diff) |
some minor formatting tweaks
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1279 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'dsa-texts/2.6.18.dfsg.1-23etch1')
-rw-r--r-- | dsa-texts/2.6.18.dfsg.1-23etch1 | 25 |
1 files changed, 13 insertions, 12 deletions
diff --git a/dsa-texts/2.6.18.dfsg.1-23etch1 b/dsa-texts/2.6.18.dfsg.1-23etch1 index 74accfc9..8d35c5f0 100644 --- a/dsa-texts/2.6.18.dfsg.1-23etch1 +++ b/dsa-texts/2.6.18.dfsg.1-23etch1 @@ -19,8 +19,9 @@ problems: CVE-2008-3527 - Tavis Ormandy reported a local DoS and potential privilege escalation - in the Virtual Dynamic Shared Objects (vDSO) implementation. + Tavis Ormandy reported a local DoS and potential privilege + escalation in the Virtual Dynamic Shared Objects (vDSO) + implementation. CVE-2008-3528 @@ -75,9 +76,9 @@ CVE-2008-5029 CVE-2008-5079 - Hugo Dias reported a DoS condition in the ATM subsystem - that can be triggered by a local user by calling the svc_listen - function twice on the same socket and reading /proc/net/atm/*vc. + Hugo Dias reported a DoS condition in the ATM subsystem that can + be triggered by a local user by calling the svc_listen function + twice on the same socket and reading /proc/net/atm/*vc. CVE_2008-5182 @@ -98,13 +99,13 @@ We recommend that you upgrade your linux-2.6, fai-kernels, and user-mode-linux packages. Note: Debian 'etch' includes linux kernel packages based upon both the -2.6.18 and 2.6.24 linux releases. All known security issues are carefully -tracked against both packages and both packages will receive security -updates until security support for Debian 'etch' concludes. However, given -the high frequency at which low-severity security issues are discovered in -the kernel and the resource requirements of doing an update, lower severity -2.6.18 and 2.6.24 updates will typically release in a staggered or "leap-frog" -fashion. +2.6.18 and 2.6.24 linux releases. All known security issues are +carefully tracked against both packages and both packages will receive +security updates until security support for Debian 'etch' +concludes. However, given the high frequency at which low-severity +security issues are discovered in the kernel and the resource +requirements of doing an update, lower severity 2.6.18 and 2.6.24 +updates will typically release in a staggered or "leap-frog" fashion. Upgrade instructions -------------------- |