summaryrefslogtreecommitdiffstats
path: root/dsa-texts/2.6.26-26lenny2
diff options
context:
space:
mode:
authordann frazier <dannf@debian.org>2011-03-27 23:04:26 +0000
committerdann frazier <dannf@debian.org>2011-03-27 23:04:26 +0000
commit3357c9df36e8f4b39c283132a166be189ba9cab5 (patch)
tree20bf8d0794c1577297e3a5cf0a827fde171389bb /dsa-texts/2.6.26-26lenny2
parent5669325ad515e5b4baabe79811fae0964156a164 (diff)
fleshout
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@2245 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'dsa-texts/2.6.26-26lenny2')
-rw-r--r--dsa-texts/2.6.26-26lenny231
1 files changed, 13 insertions, 18 deletions
diff --git a/dsa-texts/2.6.26-26lenny2 b/dsa-texts/2.6.26-26lenny2
index 5ebd8420..62267abe 100644
--- a/dsa-texts/2.6.26-26lenny2
+++ b/dsa-texts/2.6.26-26lenny2
@@ -1,8 +1,8 @@
-----------------------------------------------------------------------
-Debian Security Advisory DSA-XXXX-1 security@debian.org
-http://www.debian.org/security/ dann frazier
-January XX, 2011 http://www.debian.org/security/faq
-----------------------------------------------------------------------
+-------------------------------------------------------------------------
+Debian Security Advisory DSA-2153-1 security@debian.org
+http://www.debian.org/security/ dann frazier
+January 30, 2011 http://www.debian.org/security/faq
+-------------------------------------------------------------------------
Package : linux-2.6
Vulnerability : privilege escalation/denial of service/information leak
@@ -13,8 +13,7 @@ CVE Id(s) : CVE-2010-0435 CVE-2010-3699 CVE-2010-4158 CVE-2010-4162
CVE-2010-4249 CVE-2010-4258 CVE-2010-4342 CVE-2010-4346
CVE-2010-4526 CVE-2010-4527 CVE-2010-4529 CVE-2010-4565
CVE-2010-4649 CVE-2010-4656 CVE-2010-4668 CVE-2011-0521
-Debian Bug(s) :
-
+
Several vulnerabilities have been discovered in the Linux kernel that may lead
to a privilege escalation, denial of service or information leak. The Common
Vulnerabilities and Exposures project identifies the following problems:
@@ -144,10 +143,8 @@ CVE-2011-0521
users can pass a negative info->num value, corrupting kernel memory and
causing a denial of service.
-For the stable distribution (lenny), this problem has been fixed in version
-2.6.26-26lenny2.
-
-We recommend that you upgrade your linux-2.6 and user-mode-linux packages.
+For the stable distribution (lenny), this problem has been fixed in
+version 2.6.26-26lenny2.
The following matrix lists additional source packages that were rebuilt for
compatibility with or to take advantage of this update:
@@ -155,15 +152,13 @@ compatibility with or to take advantage of this update:
Debian 5.0 (lenny)
user-mode-linux 2.6.26-1um-2+26lenny2
-Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64,
-mipsel, powerpc, s390 and sparc. The update for mips will be released once it
-becomes available.
-
-Further information about Debian Security Advisories, how to apply these
-updates to your system and frequently asked questions can be found at:
-http://www.debian.org/security/
+We recommend that you upgrade your linux-2.6 and user-mode-linux packages.
Note that these updates will not become active until after your system is
rebooted.
+Further information about Debian Security Advisories, how to apply
+these updates to your system and frequently asked questions can be
+found at: http://www.debian.org/security/
+
Mailing list: debian-security-announce@lists.debian.org

© 2014-2024 Faster IT GmbH | imprint | privacy policy