summaryrefslogtreecommitdiffstats
path: root/dsa-texts/2.6.18.dfsg.1-23etch1
diff options
context:
space:
mode:
authorMicah Anderson <micah@debian.org>2008-12-15 21:21:48 +0000
committerMicah Anderson <micah@debian.org>2008-12-15 21:21:48 +0000
commit263bf77409de7d802e9b8d374b950e921a30bff7 (patch)
treebc8f74aac44828b8f2c55d5e7afbc516d2804b35 /dsa-texts/2.6.18.dfsg.1-23etch1
parentbc3c097a89bc8e9e7fb167472b255aeeb6eb7d6d (diff)
some minor formatting tweaks
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1279 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'dsa-texts/2.6.18.dfsg.1-23etch1')
-rw-r--r--dsa-texts/2.6.18.dfsg.1-23etch125
1 files changed, 13 insertions, 12 deletions
diff --git a/dsa-texts/2.6.18.dfsg.1-23etch1 b/dsa-texts/2.6.18.dfsg.1-23etch1
index 74accfc9..8d35c5f0 100644
--- a/dsa-texts/2.6.18.dfsg.1-23etch1
+++ b/dsa-texts/2.6.18.dfsg.1-23etch1
@@ -19,8 +19,9 @@ problems:
CVE-2008-3527
- Tavis Ormandy reported a local DoS and potential privilege escalation
- in the Virtual Dynamic Shared Objects (vDSO) implementation.
+ Tavis Ormandy reported a local DoS and potential privilege
+ escalation in the Virtual Dynamic Shared Objects (vDSO)
+ implementation.
CVE-2008-3528
@@ -75,9 +76,9 @@ CVE-2008-5029
CVE-2008-5079
- Hugo Dias reported a DoS condition in the ATM subsystem
- that can be triggered by a local user by calling the svc_listen
- function twice on the same socket and reading /proc/net/atm/*vc.
+ Hugo Dias reported a DoS condition in the ATM subsystem that can
+ be triggered by a local user by calling the svc_listen function
+ twice on the same socket and reading /proc/net/atm/*vc.
CVE_2008-5182
@@ -98,13 +99,13 @@ We recommend that you upgrade your linux-2.6, fai-kernels, and
user-mode-linux packages.
Note: Debian 'etch' includes linux kernel packages based upon both the
-2.6.18 and 2.6.24 linux releases. All known security issues are carefully
-tracked against both packages and both packages will receive security
-updates until security support for Debian 'etch' concludes. However, given
-the high frequency at which low-severity security issues are discovered in
-the kernel and the resource requirements of doing an update, lower severity
-2.6.18 and 2.6.24 updates will typically release in a staggered or "leap-frog"
-fashion.
+2.6.18 and 2.6.24 linux releases. All known security issues are
+carefully tracked against both packages and both packages will receive
+security updates until security support for Debian 'etch'
+concludes. However, given the high frequency at which low-severity
+security issues are discovered in the kernel and the resource
+requirements of doing an update, lower severity 2.6.18 and 2.6.24
+updates will typically release in a staggered or "leap-frog" fashion.
Upgrade instructions
--------------------

© 2014-2024 Faster IT GmbH | imprint | privacy policy