diff options
author | Micah Anderson <micah@debian.org> | 2009-06-01 22:59:44 +0000 |
---|---|---|
committer | Micah Anderson <micah@debian.org> | 2009-06-01 22:59:44 +0000 |
commit | 3c7694631909bab952b1d972acf221f1e8a3b8a2 (patch) | |
tree | 09aadda4be986c6e14b1cda89dcab723d5588a84 /dsa-texts/2.6.26-15lenny3 | |
parent | ede643ea1bd2ff80a464983c567f3aedd564bf76 (diff) |
update the vulnerability list, fix some spelling errors
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1396 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'dsa-texts/2.6.26-15lenny3')
-rw-r--r-- | dsa-texts/2.6.26-15lenny3 | 22 |
1 files changed, 12 insertions, 10 deletions
diff --git a/dsa-texts/2.6.26-15lenny3 b/dsa-texts/2.6.26-15lenny3 index 12c0709a..2d190120 100644 --- a/dsa-texts/2.6.26-15lenny3 +++ b/dsa-texts/2.6.26-15lenny3 @@ -5,7 +5,7 @@ Jun 01, 2009 http://www.debian.org/security/faq ---------------------------------------------------------------------- Package : linux-2.6 -Vulnerability : denial of service +Vulnerability : denial of service, privilege escalation, memory leak Problem type : local/remote Debian-specific: no CVE Id(s) : CVE-2009-1630 CVE-2009-1633 CVE-2009-1758 @@ -22,8 +22,8 @@ CVE-2009-1630 CVE-2009-1633 - Jeff Layton and Suresh Jayaraman fixed several buffer overflows - in the CIFS filesystem whcih allow remote servers to cause memory + Jeff Layton and Suresh Jayaraman fixed several buffer overflows in + the CIFS filesystem which allow remote servers to cause memory corruption. CVE-2009-1758 @@ -31,17 +31,19 @@ CVE-2009-1758 Jan Beulich discovered an issue in Xen where local guest users may cause a denial of service (oops). -This update also fixes a regression introduced by the fix for CVE-2009-1184 -in 2.6.26-15lenny3. This prevents a boottime panic on systems with selinux -enabled. +This update also fixes a regression introduced by the fix for +CVE-2009-1184 in 2.6.26-15lenny3. This prevents a boot time panic on +systems with SELinux enabled. For the stable distribution (lenny), these problems have been fixed in version 2.6.26-15lenny3. -For the oldstable distribution (etch), these problems, where applicable, -will be fixed in future updates to linux-2.6 and linux-2.6.24. +For the oldstable distribution (etch), these problems, where +applicable, will be fixed in future updates to linux-2.6 and +linux-2.6.24. -We recommend that you upgrade your linux-2.6 and user-mode-linux packages. +We recommend that you upgrade your linux-2.6 and user-mode-linux +packages. Note: Debian carefully tracks all known security issues across every linux kernel package in all releases under active security support. @@ -68,7 +70,7 @@ apt-get upgrade will install corrected packages The following matrix lists additional source packages that were rebuilt for -compatability with or to take advantage of this update: +compatibility with or to take advantage of this update: Debian 5.0 (lenny) user-mode-linux 2.6.26-1um-2+15lenny3 |