[kernel-sec-discuss] r2471 - dsa-texts
Moritz Muehlenhoff
jmm at alioth.debian.org
Thu Sep 1 20:42:32 UTC 2011
Author: jmm
Date: 2011-09-01 20:42:31 +0000 (Thu, 01 Sep 2011)
New Revision: 2471
Added:
dsa-texts/2.6.32-35squeeze1
Log:
initial stub advisory
Added: dsa-texts/2.6.32-35squeeze1
===================================================================
--- dsa-texts/2.6.32-35squeeze1 (rev 0)
+++ dsa-texts/2.6.32-35squeeze1 2011-09-01 20:42:31 UTC (rev 2471)
@@ -0,0 +1,113 @@
+----------------------------------------------------------------------
+Debian Security Advisory DSA-2240-1 security at debian.org
+http://www.debian.org/security/ dann frazier
+May 24, 2011 http://www.debian.org/security/faq
+----------------------------------------------------------------------
+
+Package : linux-2.6
+Vulnerability : privilege escalation/denial of service/information leak
+Problem type : local/remote
+Debian-specific: no
+CVE Id(s) : CVE-2011-1020 CVE-2011-1576 CVE-2011-2484 CVE-2011-2491
+ CVE-2011-2492 CVE-2011-2495 CVE-2011-2496 CVE-2011-2497
+ CVE-2011-2517 CVE-2011-2525 CVE-2011-2700 CVE-2011-2723
+ CVE-2011-2905 CVE-2011-2909 CVE-2011-2918 CVE-2011-2928
+ CVE-2011-3188 CVE-2011-3191
+
+Several vulnerabilities have been discovered in the Linux kernel that may lead
+to a denial of service or privilege escalation. The Common Vulnerabilities and
+Exposures project identifies the following problems:
+
+CVE-2011-1020
+
+ foo
+
+CVE-2011-1576
+
+ foo
+
+CVE-2011-2484
+
+ foo
+
+CVE-2011-2491
+
+ foo
+
+CVE-2011-2492
+
+ foo
+
+CVE-2011-2495
+
+ foo
+
+CVE-2011-2496
+
+ foo
+
+CVE-2011-2497
+
+ foo
+
+CVE-2011-2517
+
+ foo
+
+CVE-2011-2525
+
+ foo
+
+CVE-2011-2700
+
+ foo
+
+CVE-2011-2723
+
+ foo
+
+CVE-2011-2905
+
+ foo
+
+CVE-2011-2909
+
+ foo
+
+CVE-2011-2918
+
+ foo
+
+CVE-2011-2928
+
+ foo
+
+CVE-2011-3188
+
+ foo
+
+CVE-2011-3191
+
+ foo
+
+This update also includes a fix for a regression introduced with the previous
+security fix for CVE-2011-1768 (Debian: #633738)
+
+For the stable distribution (squeeze), this problem has been fixed in version
+2.6.32-35squeeze1. Updates for issues impacting the oldstable distribution
+(lenny) will be available soon.
+
+The following matrix lists additional source packages that were rebuilt for
+compatibility with or to take advantage of this update:
+
+ Debian 6.0 (squeeze)
+ user-mode-linux 2.6.32-1um-4+35squeeze1
+
+We recommend that you upgrade your linux-2.6 and user-mode-linux packages.
+
+Further information about Debian Security Advisories, how to apply
+these updates to your system and frequently asked questions can be
+found at: http://www.debian.org/security/
+
+Mailing list: debian-security-announce at lists.debian.org
+
More information about the kernel-sec-discuss
mailing list