summaryrefslogtreecommitdiffstats
path: root/dsa-texts/2.6.26-15lenny3
diff options
context:
space:
mode:
authorMicah Anderson <micah@debian.org>2009-06-01 22:59:44 +0000
committerMicah Anderson <micah@debian.org>2009-06-01 22:59:44 +0000
commit3c7694631909bab952b1d972acf221f1e8a3b8a2 (patch)
tree09aadda4be986c6e14b1cda89dcab723d5588a84 /dsa-texts/2.6.26-15lenny3
parentede643ea1bd2ff80a464983c567f3aedd564bf76 (diff)
update the vulnerability list, fix some spelling errors
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1396 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'dsa-texts/2.6.26-15lenny3')
-rw-r--r--dsa-texts/2.6.26-15lenny322
1 files changed, 12 insertions, 10 deletions
diff --git a/dsa-texts/2.6.26-15lenny3 b/dsa-texts/2.6.26-15lenny3
index 12c0709a..2d190120 100644
--- a/dsa-texts/2.6.26-15lenny3
+++ b/dsa-texts/2.6.26-15lenny3
@@ -5,7 +5,7 @@ Jun 01, 2009 http://www.debian.org/security/faq
----------------------------------------------------------------------
Package : linux-2.6
-Vulnerability : denial of service
+Vulnerability : denial of service, privilege escalation, memory leak
Problem type : local/remote
Debian-specific: no
CVE Id(s) : CVE-2009-1630 CVE-2009-1633 CVE-2009-1758
@@ -22,8 +22,8 @@ CVE-2009-1630
CVE-2009-1633
- Jeff Layton and Suresh Jayaraman fixed several buffer overflows
- in the CIFS filesystem whcih allow remote servers to cause memory
+ Jeff Layton and Suresh Jayaraman fixed several buffer overflows in
+ the CIFS filesystem which allow remote servers to cause memory
corruption.
CVE-2009-1758
@@ -31,17 +31,19 @@ CVE-2009-1758
Jan Beulich discovered an issue in Xen where local guest users may
cause a denial of service (oops).
-This update also fixes a regression introduced by the fix for CVE-2009-1184
-in 2.6.26-15lenny3. This prevents a boottime panic on systems with selinux
-enabled.
+This update also fixes a regression introduced by the fix for
+CVE-2009-1184 in 2.6.26-15lenny3. This prevents a boot time panic on
+systems with SELinux enabled.
For the stable distribution (lenny), these problems have been fixed in
version 2.6.26-15lenny3.
-For the oldstable distribution (etch), these problems, where applicable,
-will be fixed in future updates to linux-2.6 and linux-2.6.24.
+For the oldstable distribution (etch), these problems, where
+applicable, will be fixed in future updates to linux-2.6 and
+linux-2.6.24.
-We recommend that you upgrade your linux-2.6 and user-mode-linux packages.
+We recommend that you upgrade your linux-2.6 and user-mode-linux
+packages.
Note: Debian carefully tracks all known security issues across every
linux kernel package in all releases under active security support.
@@ -68,7 +70,7 @@ apt-get upgrade
will install corrected packages
The following matrix lists additional source packages that were rebuilt for
-compatability with or to take advantage of this update:
+compatibility with or to take advantage of this update:
Debian 5.0 (lenny)
user-mode-linux 2.6.26-1um-2+15lenny3

© 2014-2024 Faster IT GmbH | imprint | privacy policy