summaryrefslogtreecommitdiffstats
path: root/dsa-texts/2.6.32-48squeeze3
diff options
context:
space:
mode:
authordann frazier <dannf@debian.org>2013-05-14 15:43:19 +0000
committerdann frazier <dannf@debian.org>2013-05-14 15:43:19 +0000
commite194610f574438949193fe363dcae823b9a0fcb8 (patch)
tree2b841dd130600cc1dee815394848d9cbfb57ba1a /dsa-texts/2.6.32-48squeeze3
parentdf6781129f66cba4e9e8aec3fa3a24481a780213 (diff)
various updates
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@2951 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'dsa-texts/2.6.32-48squeeze3')
-rw-r--r--dsa-texts/2.6.32-48squeeze324
1 files changed, 18 insertions, 6 deletions
diff --git a/dsa-texts/2.6.32-48squeeze3 b/dsa-texts/2.6.32-48squeeze3
index 8308ebdd..ded0c364 100644
--- a/dsa-texts/2.6.32-48squeeze3
+++ b/dsa-texts/2.6.32-48squeeze3
@@ -1,12 +1,12 @@
----------------------------------------------------------------------
-Debian Security Advisory DSA-XXXX-1 security@debian.org
+Debian Security Advisory DSA-2668-1 security@debian.org
http://www.debian.org/security/ Dann Frazier
May 14, 2013 http://www.debian.org/security/faq
----------------------------------------------------------------------
Package : linux-2.6
-Vulnerability : privilege escalation/denial of service
-Problem type : local
+Vulnerability : privilege escalation/denial of service/information leak
+Problem type : local/remote
Debian-specific: no
CVE Id(s) : CVE-2012-2121 CVE-2012-3552 CVE-2012-4461 CVE-2012-4508
CVE-2012-6537 CVE-2012-6539 CVE-2012-6540 CVE-2012-6542
@@ -31,7 +31,7 @@ CVE-2012-2121
CVE-2012-3552
- Hafid Lin reported an issue in the IP network subsystem. A remote user
+ Hafid Lin reported an issue in the IP networking subsystem. A remote user
can cause a denial of service (system crash) on servers running
applications that set options on sockets which are actively being
processed.
@@ -43,6 +43,10 @@ CVE-2012-4461
access to the /dev/kvm interface can cause a system crash.
CVE-2012-4508
+
+ Dmitry Monakhov and Theodore Ts'o reported a race condition in the ext4
+ filesystem. Local users could gain access to sensitive kernel memory.
+
CVE-2012-6537
Mathias Krause discovered information leak issues in the Transformation
@@ -225,8 +229,8 @@ CVE-2013-3235
Communication (TIPC) protocol support. Local users can gain access to
sensitive kernel memory.
-For the stable distribution (squeeze), this problem has been fixed in version
-2.6.32-48squeeze3.
+For the oldstable distribution (squeeze), this problem has been fixed in
+version 2.6.32-48squeeze3.
The following matrix lists additional source packages that were rebuilt for
compatibility with or to take advantage of this update:
@@ -238,6 +242,14 @@ We recommend that you upgrade your linux-2.6 and user-mode-linux packages.
Thanks to Micah Anderson for proof reading this text.
+Note: Debian carefully tracks all known security issues across every
+linux kernel package in all releases under active security support.
+However, given the high frequency at which low-severity security
+issues are discovered in the kernel and the resource requirements of
+doing an update, updates for lower priority issues will normally not
+be released for all kernels at the same time. Rather, they will be
+released in a staggered or "leap-frog" fashion.
+
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

© 2014-2024 Faster IT GmbH | imprint | privacy policy