diff options
author | Ben Hutchings <ben@decadent.org.uk> | 2020-06-07 23:42:26 +0100 |
---|---|---|
committer | Ben Hutchings <ben@decadent.org.uk> | 2020-06-08 00:12:44 +0100 |
commit | 462439197994d3c034769d2402449bbf8b041ebc (patch) | |
tree | 3edad2e9de7026ba8bfa03b0d0c46325614e189f /dsa-texts/4.19.118-2+deb10u1 | |
parent | 4cc0ec706f55b39998cfc376dc4162bc74738921 (diff) |
dsa-texts: Add the summary text and note the additional fixes at the bottom
Diffstat (limited to 'dsa-texts/4.19.118-2+deb10u1')
-rw-r--r-- | dsa-texts/4.19.118-2+deb10u1 | 11 |
1 files changed, 9 insertions, 2 deletions
diff --git a/dsa-texts/4.19.118-2+deb10u1 b/dsa-texts/4.19.118-2+deb10u1 index 55b7c443..69df4781 100644 --- a/dsa-texts/4.19.118-2+deb10u1 +++ b/dsa-texts/4.19.118-2+deb10u1 @@ -13,6 +13,10 @@ CVE ID : CVE-2019-3016 CVE-2019-19462 CVE-2020-0543 CVE-2020-10711 CVE-2020-12464 CVE-2020-12768 CVE-2020-12770 CVE-2020-13143 Debian Bug : 960271 +Several vulnerabilities have been discovered in the Linux kernel that +may lead to a privilege escalation, denial of service or information +leaks. + CVE-2019-3016 It was discovered that the KVM implementation for x86 did not @@ -86,8 +90,11 @@ CVE-2020-13143 denial of service (crash or memory corruption) or potentially for privilege escalation. -For the stable distribution (buster), these problems have been fixed in -version 4.19.118-2+deb10u1. +For the stable distribution (buster), these problems have been fixed +in version 4.19.118-2+deb10u1. This version also fixes some related +bugs that do not have their own CVE IDs, and a regression in the +<linux/swab.h> UAPI header introduced in the previous point release +(bug #960271). We recommend that you upgrade your linux packages. |