summaryrefslogtreecommitdiffstats
path: root/dsa-texts/2.6.24-6~etchnhalf.5
diff options
context:
space:
mode:
authorMicah Anderson <micah@debian.org>2008-09-11 03:16:42 +0000
committerMicah Anderson <micah@debian.org>2008-09-11 03:16:42 +0000
commitd99c9167ab104169664e26e64811e2ffbbf04107 (patch)
treeb2adcbbacdff2ce04ffa87087e229d0de0ce09f6 /dsa-texts/2.6.24-6~etchnhalf.5
parent95e0bfc463383c72bdee090d613e87e8a41a6d51 (diff)
changed problem to be plural and fixed the version number
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1221 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'dsa-texts/2.6.24-6~etchnhalf.5')
-rw-r--r--dsa-texts/2.6.24-6~etchnhalf.54
1 files changed, 2 insertions, 2 deletions
diff --git a/dsa-texts/2.6.24-6~etchnhalf.5 b/dsa-texts/2.6.24-6~etchnhalf.5
index f850a8ed..fe34ca94 100644
--- a/dsa-texts/2.6.24-6~etchnhalf.5
+++ b/dsa-texts/2.6.24-6~etchnhalf.5
@@ -64,8 +64,8 @@ CVE-2008-3915
that may allow remote attackers to cause a denial of service via a
buffer overflow.
-For the stable distribution (etch), this problem has been fixed in
-version 2.6.22-6~etchnhalf.5.
+For the stable distribution (etch), these problems have been fixed in
+version 2.6.24-6~etchnhalf.5.
We recommend that you upgrade your linux-2.6.24 packages.

© 2014-2024 Faster IT GmbH | imprint | privacy policy