diff options
author | dann frazier <dannf@debian.org> | 2011-03-27 23:04:26 +0000 |
---|---|---|
committer | dann frazier <dannf@debian.org> | 2011-03-27 23:04:26 +0000 |
commit | 3357c9df36e8f4b39c283132a166be189ba9cab5 (patch) | |
tree | 20bf8d0794c1577297e3a5cf0a827fde171389bb /dsa-texts/2.6.26-26lenny2 | |
parent | 5669325ad515e5b4baabe79811fae0964156a164 (diff) |
fleshout
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@2245 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'dsa-texts/2.6.26-26lenny2')
-rw-r--r-- | dsa-texts/2.6.26-26lenny2 | 31 |
1 files changed, 13 insertions, 18 deletions
diff --git a/dsa-texts/2.6.26-26lenny2 b/dsa-texts/2.6.26-26lenny2 index 5ebd8420..62267abe 100644 --- a/dsa-texts/2.6.26-26lenny2 +++ b/dsa-texts/2.6.26-26lenny2 @@ -1,8 +1,8 @@ ----------------------------------------------------------------------- -Debian Security Advisory DSA-XXXX-1 security@debian.org -http://www.debian.org/security/ dann frazier -January XX, 2011 http://www.debian.org/security/faq ----------------------------------------------------------------------- +------------------------------------------------------------------------- +Debian Security Advisory DSA-2153-1 security@debian.org +http://www.debian.org/security/ dann frazier +January 30, 2011 http://www.debian.org/security/faq +------------------------------------------------------------------------- Package : linux-2.6 Vulnerability : privilege escalation/denial of service/information leak @@ -13,8 +13,7 @@ CVE Id(s) : CVE-2010-0435 CVE-2010-3699 CVE-2010-4158 CVE-2010-4162 CVE-2010-4249 CVE-2010-4258 CVE-2010-4342 CVE-2010-4346 CVE-2010-4526 CVE-2010-4527 CVE-2010-4529 CVE-2010-4565 CVE-2010-4649 CVE-2010-4656 CVE-2010-4668 CVE-2011-0521 -Debian Bug(s) : - + Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leak. The Common Vulnerabilities and Exposures project identifies the following problems: @@ -144,10 +143,8 @@ CVE-2011-0521 users can pass a negative info->num value, corrupting kernel memory and causing a denial of service. -For the stable distribution (lenny), this problem has been fixed in version -2.6.26-26lenny2. - -We recommend that you upgrade your linux-2.6 and user-mode-linux packages. +For the stable distribution (lenny), this problem has been fixed in +version 2.6.26-26lenny2. The following matrix lists additional source packages that were rebuilt for compatibility with or to take advantage of this update: @@ -155,15 +152,13 @@ compatibility with or to take advantage of this update: Debian 5.0 (lenny) user-mode-linux 2.6.26-1um-2+26lenny2 -Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, -mipsel, powerpc, s390 and sparc. The update for mips will be released once it -becomes available. - -Further information about Debian Security Advisories, how to apply these -updates to your system and frequently asked questions can be found at: -http://www.debian.org/security/ +We recommend that you upgrade your linux-2.6 and user-mode-linux packages. Note that these updates will not become active until after your system is rebooted. +Further information about Debian Security Advisories, how to apply +these updates to your system and frequently asked questions can be +found at: http://www.debian.org/security/ + Mailing list: debian-security-announce@lists.debian.org |