summaryrefslogtreecommitdiffstats
path: root/dsa-texts/2.6.32-48squeeze6
diff options
context:
space:
mode:
authordann frazier <dannf@debian.org>2014-05-14 15:49:09 +0000
committerdann frazier <dannf@debian.org>2014-05-14 15:49:09 +0000
commit51e70c657abfcc2cf8f219ffa4ed96b191c451f0 (patch)
treee7444b10b20f5166a187c39e4caee6aaed4254e9 /dsa-texts/2.6.32-48squeeze6
parent28a2f44f8cb8d823a40ae78bdf3ed2e635e2b858 (diff)
new dsa text
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@3350 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'dsa-texts/2.6.32-48squeeze6')
-rw-r--r--dsa-texts/2.6.32-48squeeze651
1 files changed, 51 insertions, 0 deletions
diff --git a/dsa-texts/2.6.32-48squeeze6 b/dsa-texts/2.6.32-48squeeze6
new file mode 100644
index 00000000..84801e0d
--- /dev/null
+++ b/dsa-texts/2.6.32-48squeeze6
@@ -0,0 +1,51 @@
+----------------------------------------------------------------------
+Debian Security Advisory DSA-2928-1 security@debian.org
+http://www.debian.org/security/ Dann Frazier
+May 14, 2014 http://www.debian.org/security/faq
+----------------------------------------------------------------------
+
+Package : linux-2.6
+Vulnerability : privilege escalation/denial of service/information leak
+Problem type : local
+Debian-specific: no
+CVE Id(s) : CVE-2014-0196 CVE-2014-1737 CVE-2014-1738
+
+Several vulnerabilities have been discovered in the Linux kernel that may lead
+to a denial of service, information leak or privilege escalation. The Common
+Vulnerabilities and Exposures project identifies the following problems:
+
+CVE-2014-0196
+
+ Jiri Slaby discovered a race condition in the pty layer, which could lead
+ to a denial of service or privilege escalation.
+
+CVE-2014-1737 CVE-2014-1738
+
+ Matthew Daley discovered an information leak and missing input
+ sanitising in the FDRAWCMD ioctl of the floppy driver. This could result
+ in a privilege escalation.
+
+For the oldstable distribution (squeeze), this problem has been fixed in
+version 2.6.32-48squeeze6.
+
+The following matrix lists additional source packages that were rebuilt for
+compatibility with or to take advantage of this update:
+
+ Debian 6.0 (squeeze)
+ user-mode-linux 2.6.32-1um-4+48squeeze6
+
+We recommend that you upgrade your linux-2.6 and user-mode-linux packages.
+
+Note: Debian carefully tracks all known security issues across every
+linux kernel package in all releases under active security support.
+However, given the high frequency at which low-severity security
+issues are discovered in the kernel and the resource requirements of
+doing an update, updates for lower priority issues will normally not
+be released for all kernels at the same time. Rather, they will be
+released in a staggered or "leap-frog" fashion.
+
+Further information about Debian Security Advisories, how to apply
+these updates to your system and frequently asked questions can be
+found at: http://www.debian.org/security/
+
+Mailing list: debian-security-announce@lists.debian.org

© 2014-2024 Faster IT GmbH | imprint | privacy policy