diff options
author | Simon Paillard <spaillard> | 2009-08-15 12:10:19 +0000 |
---|---|---|
committer | Simon Paillard <spaillard> | 2009-08-15 12:10:19 +0000 |
commit | a5c56468dcfccf6bb682f02698881530b13a8d95 (patch) | |
tree | 7ab6c91445b3a7312e1eb680d8c132e722eca68f | |
parent | 54ad507b4ffafa08f646b66d69fc1847bd31ca6f (diff) |
[DSA 1862-1] New Linux 2.6.26 packages fix privilege escalation
CVS version numbers
english/security/2009/dsa-1862.data: INITIAL -> 1.1
english/security/2009/dsa-1862.wml: INITIAL -> 1.1
-rw-r--r-- | english/security/2009/dsa-1862.data | 171 | ||||
-rw-r--r-- | english/security/2009/dsa-1862.wml | 38 |
2 files changed, 209 insertions, 0 deletions
diff --git a/english/security/2009/dsa-1862.data b/english/security/2009/dsa-1862.data new file mode 100644 index 00000000000..bf3c08228da --- /dev/null +++ b/english/security/2009/dsa-1862.data @@ -0,0 +1,171 @@ +<define-tag pagetitle>DSA-1862-1 linux-2.6</define-tag> +<define-tag report_date>2009-8-14</define-tag> +<define-tag secrefs>CVE-2009-2692</define-tag> +<define-tag packages>linux-2.6</define-tag> +<define-tag isvulnerable>yes</define-tag> +<define-tag fixed>yes</define-tag> + +#use wml::debian::security + +<h3>Debian GNU/Linux 5.0 (lenny)</h3> + +<dl> + +<dt><source /> + + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-17lenny2.dsc /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26.orig.tar.gz /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-17lenny2.diff.gz /> + +<dt><arch-indep /> + + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.26_2.6.26-17lenny2_all.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.26_2.6.26-17lenny2_all.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.26_2.6.26-17lenny2_all.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.26_2.6.26-17lenny2_all.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.26_2.6.26-17lenny2_all.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.26-2_2.6.26-17lenny2_all.deb /> + +<dt>Alpha: + + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-smp_2.6.26-17lenny2_alpha.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-smp_2.6.26-17lenny2_alpha.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-legacy_2.6.26-17lenny2_alpha.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_alpha.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-generic_2.6.26-17lenny2_alpha.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-legacy_2.6.26-17lenny2_alpha.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-generic_2.6.26-17lenny2_alpha.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-alpha_2.6.26-17lenny2_alpha.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_alpha.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_alpha.deb /> + +<dt>AMD64: + + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-amd64_2.6.26-17lenny2_amd64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-17lenny2_amd64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-amd64_2.6.26-17lenny2_amd64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-17lenny2_amd64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-amd64_2.6.26-17lenny2_amd64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-17lenny2_amd64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_amd64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_amd64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_amd64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_amd64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-amd64_2.6.26-17lenny2_amd64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-17lenny2_amd64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-amd64_2.6.26-17lenny2_amd64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-amd64_2.6.26-17lenny2_amd64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-amd64_2.6.26-17lenny2_amd64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-amd64_2.6.26-17lenny2_amd64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-amd64_2.6.26-17lenny2_amd64.deb /> + +<dt>ARM EABI: + + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-17lenny2_armel.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_armel.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-17lenny2_armel.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-armel_2.6.26-17lenny2_armel.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_armel.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-17lenny2_armel.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-17lenny2_armel.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-versatile_2.6.26-17lenny2_armel.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-17lenny2_armel.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-17lenny2_armel.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_armel.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-versatile_2.6.26-17lenny2_armel.deb /> + +<dt>HP Precision: + + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc_2.6.26-17lenny2_hppa.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc-smp_2.6.26-17lenny2_hppa.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc_2.6.26-17lenny2_hppa.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64_2.6.26-17lenny2_hppa.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-hppa_2.6.26-17lenny2_hppa.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_hppa.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_hppa.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64_2.6.26-17lenny2_hppa.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64-smp_2.6.26-17lenny2_hppa.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64-smp_2.6.26-17lenny2_hppa.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_hppa.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc-smp_2.6.26-17lenny2_hppa.deb /> + +<dt>Intel IA-32: + + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-686_2.6.26-17lenny2_i386.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686-bigmem_2.6.26-17lenny2_i386.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-686_2.6.26-17lenny2_i386.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686-bigmem_2.6.26-17lenny2_i386.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-17lenny2_i386.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686_2.6.26-17lenny2_i386.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686_2.6.26-17lenny2_i386.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-686_2.6.26-17lenny2_i386.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686-bigmem_2.6.26-17lenny2_i386.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-17lenny2_i386.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_i386.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_i386.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686_2.6.26-17lenny2_i386.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-486_2.6.26-17lenny2_i386.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-17lenny2_i386.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_i386.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-i386_2.6.26-17lenny2_i386.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-17lenny2_i386.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-686_2.6.26-17lenny2_i386.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686-bigmem_2.6.26-17lenny2_i386.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_i386.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-486_2.6.26-17lenny2_i386.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686_2.6.26-17lenny2_i386.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-686_2.6.26-17lenny2_i386.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-686_2.6.26-17lenny2_i386.deb /> + +<dt>Intel IA-64: + + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-mckinley_2.6.26-17lenny2_ia64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-mckinley_2.6.26-17lenny2_ia64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-itanium_2.6.26-17lenny2_ia64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-ia64_2.6.26-17lenny2_ia64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-itanium_2.6.26-17lenny2_ia64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-itanium_2.6.26-17lenny2_ia64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_ia64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_ia64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-itanium_2.6.26-17lenny2_ia64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_ia64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_ia64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-mckinley_2.6.26-17lenny2_ia64.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-mckinley_2.6.26-17lenny2_ia64.deb /> + +<dt>PowerPC: + + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_powerpc.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc64_2.6.26-17lenny2_powerpc.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc-smp_2.6.26-17lenny2_powerpc.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc-smp_2.6.26-17lenny2_powerpc.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_powerpc.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_powerpc.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc64_2.6.26-17lenny2_powerpc.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc_2.6.26-17lenny2_powerpc.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc_2.6.26-17lenny2_powerpc.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc_2.6.26-17lenny2_powerpc.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc_2.6.26-17lenny2_powerpc.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc64_2.6.26-17lenny2_powerpc.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-powerpc_2.6.26-17lenny2_powerpc.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_powerpc.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc64_2.6.26-17lenny2_powerpc.deb /> + +<dt>IBM S/390: + + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_s390.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390x_2.6.26-17lenny2_s390.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-s390x_2.6.26-17lenny2_s390.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390_2.6.26-17lenny2_s390.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_s390.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_s390.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_s390.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390_2.6.26-17lenny2_s390.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390x_2.6.26-17lenny2_s390.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390-tape_2.6.26-17lenny2_s390.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-s390x_2.6.26-17lenny2_s390.deb /> + <dd><fileurl http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-s390_2.6.26-17lenny2_s390.deb /> + +</dl> + +<p><md5sums http://lists.debian.org/debian-security-announce/2009/msg00179.html /></p> diff --git a/english/security/2009/dsa-1862.wml b/english/security/2009/dsa-1862.wml new file mode 100644 index 00000000000..165908a9b89 --- /dev/null +++ b/english/security/2009/dsa-1862.wml @@ -0,0 +1,38 @@ +<define-tag description>privilege escalation</define-tag> +<define-tag moreinfo> +<p>A vulnerability has been discovered in the Linux kernel that may lead +to privilege escalation. The Common Vulnerabilities and Exposures project +identifies the following problem:</p> + +<ul> + +<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2692">CVE-2009-2692</a> + + <p>Tavis Ormandy and Julien Tinnes discovered an issue with how the + sendpage function is initialized in the proto_ops structure. + Local users can exploit this vulnerability to gain elevated + privileges.</p></li> + +</ul> + +<p>For the oldstable distribution (etch), this problem will be fixed in +updates to linux-2.6 and linux-2.6.24.</p> + +<p>For the stable distribution (lenny), this problem has been fixed in +version 2.6.26-17lenny2.</p> + +<p>We recommend that you upgrade your linux-2.6 and user-mode-linux +packages.</p> + +<p>Note: Debian carefully tracks all known security issues across every +linux kernel package in all releases under active security support. +However, given the high frequency at which low-severity security +issues are discovered in the kernel and the resource requirements of +doing an update, updates for lower priority issues will normally not +be released for all kernels at the same time. Rather, they will be +released in a staggered or "leap-frog" fashion.</p> +</define-tag> + +# do not modify the following line +#include "$(ENGLISHDIR)/security/2009/dsa-1862.data" +# $Id$ |