[kernel-sec-discuss] r2245 - dsa-texts
Dann Frazier
dannf at alioth.debian.org
Sun Mar 27 23:04:27 UTC 2011
Author: dannf
Date: 2011-03-27 23:04:26 +0000 (Sun, 27 Mar 2011)
New Revision: 2245
Modified:
dsa-texts/2.6.26-26lenny2
Log:
fleshout
Modified: dsa-texts/2.6.26-26lenny2
===================================================================
--- dsa-texts/2.6.26-26lenny2 2011-03-27 23:02:04 UTC (rev 2244)
+++ dsa-texts/2.6.26-26lenny2 2011-03-27 23:04:26 UTC (rev 2245)
@@ -1,8 +1,8 @@
-----------------------------------------------------------------------
-Debian Security Advisory DSA-XXXX-1 security at debian.org
-http://www.debian.org/security/ dann frazier
-January XX, 2011 http://www.debian.org/security/faq
-----------------------------------------------------------------------
+-------------------------------------------------------------------------
+Debian Security Advisory DSA-2153-1 security at debian.org
+http://www.debian.org/security/ dann frazier
+January 30, 2011 http://www.debian.org/security/faq
+-------------------------------------------------------------------------
Package : linux-2.6
Vulnerability : privilege escalation/denial of service/information leak
@@ -13,8 +13,7 @@
CVE-2010-4249 CVE-2010-4258 CVE-2010-4342 CVE-2010-4346
CVE-2010-4526 CVE-2010-4527 CVE-2010-4529 CVE-2010-4565
CVE-2010-4649 CVE-2010-4656 CVE-2010-4668 CVE-2011-0521
-Debian Bug(s) :
-
+
Several vulnerabilities have been discovered in the Linux kernel that may lead
to a privilege escalation, denial of service or information leak. The Common
Vulnerabilities and Exposures project identifies the following problems:
@@ -144,26 +143,22 @@
users can pass a negative info->num value, corrupting kernel memory and
causing a denial of service.
-For the stable distribution (lenny), this problem has been fixed in version
-2.6.26-26lenny2.
+For the stable distribution (lenny), this problem has been fixed in
+version 2.6.26-26lenny2.
-We recommend that you upgrade your linux-2.6 and user-mode-linux packages.
-
The following matrix lists additional source packages that were rebuilt for
compatibility with or to take advantage of this update:
Debian 5.0 (lenny)
user-mode-linux 2.6.26-1um-2+26lenny2
-Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64,
-mipsel, powerpc, s390 and sparc. The update for mips will be released once it
-becomes available.
+We recommend that you upgrade your linux-2.6 and user-mode-linux packages.
-Further information about Debian Security Advisories, how to apply these
-updates to your system and frequently asked questions can be found at:
-http://www.debian.org/security/
-
Note that these updates will not become active until after your system is
rebooted.
+Further information about Debian Security Advisories, how to apply
+these updates to your system and frequently asked questions can be
+found at: http://www.debian.org/security/
+
Mailing list: debian-security-announce at lists.debian.org
More information about the kernel-sec-discuss
mailing list