[kernel-sec-discuss] r997 - dsa-texts

dannf at alioth.debian.org dannf at alioth.debian.org
Fri Oct 12 23:51:59 UTC 2007


Author: dannf
Date: 2007-10-12 23:51:59 +0000 (Fri, 12 Oct 2007)
New Revision: 997

Modified:
   dsa-texts/2.6.18.dfsg.1-13etch4
Log:
add grammar cleanups and compatability matrix

Modified: dsa-texts/2.6.18.dfsg.1-13etch4
===================================================================
--- dsa-texts/2.6.18.dfsg.1-13etch4	2007-10-12 22:51:40 UTC (rev 996)
+++ dsa-texts/2.6.18.dfsg.1-13etch4	2007-10-12 23:51:59 UTC (rev 997)
@@ -22,7 +22,7 @@
     flavour kernel. The stable distribution ('etch') was not believed to
     be vulnerable to this issue at the time of release, however Bastian
     Blank discovered that this issue still applied to the 'xen-amd64' and
-    'xen-vserver-amd64' flavours that is resolved by this DSA.
+    'xen-vserver-amd64' flavours, and is resolved by this DSA.
 
 CVE-2007-4133
 
@@ -32,7 +32,7 @@
 
 CVE-2007-4573
 
-    Wojciech Purczynski discovered a vulnerability that can be exploitd
+    Wojciech Purczynski discovered a vulnerability that can be exploited
     by a local user to obtain superuser privileges on x86_64 systems.
     This resulted from improper clearing of the high bits of registers
     during ia32 system call emulation. This vulnerability is relevant
@@ -61,6 +61,14 @@
 linux-2.6. Builds for all other architectures are now available, as well as
 rebuilds of ancillary packages that make use of the included linux source.
 
+The following matrix lists additional packages that were rebuilt for
+compatability with or to take advantage of this update:
+
+                                 Debian 4.0 (etch)
+     fai-kernels                 1.17+etch.13etch4
+     kernel-patch-openvz         028.18.1etch5
+     user-mode-linux             2.6.18-1um-2etch.13etch4
+
 We recommend that you upgrade your kernel package immediately and reboot
 the machine. If you have built a custom kernel from the kernel source
 package, you will need to rebuild to take advantage of these fixes.




More information about the kernel-sec-discuss mailing list