diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2011-09-01 20:42:31 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2011-09-01 20:42:31 +0000 |
commit | eb3219ae94e3c10a6d762255614724d0b8f7b46c (patch) | |
tree | f3fd757ffec52217b504f79b7e9a23db1f437fd4 /dsa-texts/2.6.32-35squeeze1 | |
parent | 5a1f0018a699f97a8a297e5eeeff01790597d18a (diff) |
initial stub advisory
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@2471 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'dsa-texts/2.6.32-35squeeze1')
-rw-r--r-- | dsa-texts/2.6.32-35squeeze1 | 113 |
1 files changed, 113 insertions, 0 deletions
diff --git a/dsa-texts/2.6.32-35squeeze1 b/dsa-texts/2.6.32-35squeeze1 new file mode 100644 index 000000000..a15de0b49 --- /dev/null +++ b/dsa-texts/2.6.32-35squeeze1 @@ -0,0 +1,113 @@ +---------------------------------------------------------------------- +Debian Security Advisory DSA-2240-1 security@debian.org +http://www.debian.org/security/ dann frazier +May 24, 2011 http://www.debian.org/security/faq +---------------------------------------------------------------------- + +Package : linux-2.6 +Vulnerability : privilege escalation/denial of service/information leak +Problem type : local/remote +Debian-specific: no +CVE Id(s) : CVE-2011-1020 CVE-2011-1576 CVE-2011-2484 CVE-2011-2491 + CVE-2011-2492 CVE-2011-2495 CVE-2011-2496 CVE-2011-2497 + CVE-2011-2517 CVE-2011-2525 CVE-2011-2700 CVE-2011-2723 + CVE-2011-2905 CVE-2011-2909 CVE-2011-2918 CVE-2011-2928 + CVE-2011-3188 CVE-2011-3191 + +Several vulnerabilities have been discovered in the Linux kernel that may lead +to a denial of service or privilege escalation. The Common Vulnerabilities and +Exposures project identifies the following problems: + +CVE-2011-1020 + + foo + +CVE-2011-1576 + + foo + +CVE-2011-2484 + + foo + +CVE-2011-2491 + + foo + +CVE-2011-2492 + + foo + +CVE-2011-2495 + + foo + +CVE-2011-2496 + + foo + +CVE-2011-2497 + + foo + +CVE-2011-2517 + + foo + +CVE-2011-2525 + + foo + +CVE-2011-2700 + + foo + +CVE-2011-2723 + + foo + +CVE-2011-2905 + + foo + +CVE-2011-2909 + + foo + +CVE-2011-2918 + + foo + +CVE-2011-2928 + + foo + +CVE-2011-3188 + + foo + +CVE-2011-3191 + + foo + +This update also includes a fix for a regression introduced with the previous +security fix for CVE-2011-1768 (Debian: #633738) + +For the stable distribution (squeeze), this problem has been fixed in version +2.6.32-35squeeze1. Updates for issues impacting the oldstable distribution +(lenny) will be available soon. + +The following matrix lists additional source packages that were rebuilt for +compatibility with or to take advantage of this update: + + Debian 6.0 (squeeze) + user-mode-linux 2.6.32-1um-4+35squeeze1 + +We recommend that you upgrade your linux-2.6 and user-mode-linux packages. + +Further information about Debian Security Advisories, how to apply +these updates to your system and frequently asked questions can be +found at: http://www.debian.org/security/ + +Mailing list: debian-security-announce@lists.debian.org + |