[kernel-sec-discuss] r2245 - dsa-texts

Dann Frazier dannf at alioth.debian.org
Sun Mar 27 23:04:27 UTC 2011


Author: dannf
Date: 2011-03-27 23:04:26 +0000 (Sun, 27 Mar 2011)
New Revision: 2245

Modified:
   dsa-texts/2.6.26-26lenny2
Log:
fleshout

Modified: dsa-texts/2.6.26-26lenny2
===================================================================
--- dsa-texts/2.6.26-26lenny2	2011-03-27 23:02:04 UTC (rev 2244)
+++ dsa-texts/2.6.26-26lenny2	2011-03-27 23:04:26 UTC (rev 2245)
@@ -1,8 +1,8 @@
-----------------------------------------------------------------------
-Debian Security Advisory DSA-XXXX-1                security at debian.org
-http://www.debian.org/security/                           dann frazier
-January XX, 2011                    http://www.debian.org/security/faq
-----------------------------------------------------------------------
+-------------------------------------------------------------------------
+Debian Security Advisory DSA-2153-1                   security at debian.org
+http://www.debian.org/security/                              dann frazier
+January 30, 2011                       http://www.debian.org/security/faq
+-------------------------------------------------------------------------
 
 Package        : linux-2.6
 Vulnerability  : privilege escalation/denial of service/information leak
@@ -13,8 +13,7 @@
                  CVE-2010-4249 CVE-2010-4258 CVE-2010-4342 CVE-2010-4346 
                  CVE-2010-4526 CVE-2010-4527 CVE-2010-4529 CVE-2010-4565 
                  CVE-2010-4649 CVE-2010-4656 CVE-2010-4668 CVE-2011-0521
-Debian Bug(s)  :
-                 
+
 Several vulnerabilities have been discovered in the Linux kernel that may lead
 to a privilege escalation, denial of service or information leak.  The Common
 Vulnerabilities and Exposures project identifies the following problems:
@@ -144,26 +143,22 @@
     users can pass a negative info->num value, corrupting kernel memory and
     causing a denial of service.
 
-For the stable distribution (lenny), this problem has been fixed in version
-2.6.26-26lenny2.
+For the stable distribution (lenny), this problem has been fixed in
+version 2.6.26-26lenny2.
 
-We recommend that you upgrade your linux-2.6 and user-mode-linux packages.
-
 The following matrix lists additional source packages that were rebuilt for
 compatibility with or to take advantage of this update:
 
                                              Debian 5.0 (lenny)
      user-mode-linux                         2.6.26-1um-2+26lenny2
 
-Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64,
-mipsel, powerpc, s390 and sparc. The update for mips will be released once it
-becomes available.
+We recommend that you upgrade your linux-2.6 and user-mode-linux packages.
 
-Further information about Debian Security Advisories, how to apply these
-updates to your system and frequently asked questions can be found at:
-http://www.debian.org/security/
-
 Note that these updates will not become active until after your system is
 rebooted.
 
+Further information about Debian Security Advisories, how to apply
+these updates to your system and frequently asked questions can be
+found at: http://www.debian.org/security/
+
 Mailing list: debian-security-announce at lists.debian.org




More information about the kernel-sec-discuss mailing list