[kernel-sec-discuss] r2471 - dsa-texts

Moritz Muehlenhoff jmm at alioth.debian.org
Thu Sep 1 20:42:32 UTC 2011


Author: jmm
Date: 2011-09-01 20:42:31 +0000 (Thu, 01 Sep 2011)
New Revision: 2471

Added:
   dsa-texts/2.6.32-35squeeze1
Log:
initial stub advisory


Added: dsa-texts/2.6.32-35squeeze1
===================================================================
--- dsa-texts/2.6.32-35squeeze1	                        (rev 0)
+++ dsa-texts/2.6.32-35squeeze1	2011-09-01 20:42:31 UTC (rev 2471)
@@ -0,0 +1,113 @@
+----------------------------------------------------------------------
+Debian Security Advisory DSA-2240-1                security at debian.org
+http://www.debian.org/security/                           dann frazier
+May 24, 2011                        http://www.debian.org/security/faq
+----------------------------------------------------------------------
+
+Package        : linux-2.6
+Vulnerability  : privilege escalation/denial of service/information leak
+Problem type   : local/remote
+Debian-specific: no
+CVE Id(s)      : CVE-2011-1020 CVE-2011-1576 CVE-2011-2484 CVE-2011-2491
+                 CVE-2011-2492 CVE-2011-2495 CVE-2011-2496 CVE-2011-2497
+                 CVE-2011-2517 CVE-2011-2525 CVE-2011-2700 CVE-2011-2723
+                 CVE-2011-2905 CVE-2011-2909 CVE-2011-2918 CVE-2011-2928
+                 CVE-2011-3188 CVE-2011-3191
+
+Several vulnerabilities have been discovered in the Linux kernel that may lead
+to a denial of service or privilege escalation. The Common Vulnerabilities and
+Exposures project identifies the following problems:
+
+CVE-2011-1020 
+
+    foo
+
+CVE-2011-1576 
+
+    foo
+
+CVE-2011-2484 
+
+    foo
+
+CVE-2011-2491
+
+    foo
+
+CVE-2011-2492 
+
+    foo
+
+CVE-2011-2495 
+
+    foo
+
+CVE-2011-2496 
+
+    foo
+
+CVE-2011-2497
+
+    foo
+
+CVE-2011-2517 
+
+    foo
+
+CVE-2011-2525 
+
+    foo
+
+CVE-2011-2700 
+
+    foo
+
+CVE-2011-2723
+
+    foo
+
+CVE-2011-2905 
+
+    foo
+
+CVE-2011-2909 
+
+    foo
+
+CVE-2011-2918 
+
+    foo
+
+CVE-2011-2928
+
+    foo
+
+CVE-2011-3188 
+
+    foo
+
+CVE-2011-3191
+
+    foo
+
+This update also includes a fix for a regression introduced with the previous
+security fix for CVE-2011-1768 (Debian: #633738)
+
+For the stable distribution (squeeze), this problem has been fixed in version
+2.6.32-35squeeze1. Updates for issues impacting the oldstable distribution
+(lenny) will be available soon.
+
+The following matrix lists additional source packages that were rebuilt for
+compatibility with or to take advantage of this update:
+
+                                             Debian 6.0 (squeeze)
+     user-mode-linux                         2.6.32-1um-4+35squeeze1
+
+We recommend that you upgrade your linux-2.6 and user-mode-linux packages.
+
+Further information about Debian Security Advisories, how to apply
+these updates to your system and frequently asked questions can be
+found at: http://www.debian.org/security/
+
+Mailing list: debian-security-announce at lists.debian.org
+




More information about the kernel-sec-discuss mailing list