Package: linux-image-2.6.26-2-686 Version: 2.6.26-17 Justification: root security hole Severity: critical Tags: security
*** Please type your report below this line *** Hi, today a serious bug in the Linux Kernel has been discovered and disclosed. It affects all 2.4 and 2.6 kernels since 2001 on all architectures. See here for more details: http://blog.cr0.org/2009/08/linux-null-pointer-dereference-due-to.html Hopefully this bug has already been patched: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e694958388c50148389b0e9b9e9e8945cf0f1b98 I'm pretty sure that you guys already know that, but it is really urgent to apply the patch and release an update for the linux-image packages. Thank you for your fantastic job. Stefano -- Package-specific info: ** Version: Linux version 2.6.26-2-686 (Debian 2.6.26-17) (da...@debian.org) (gcc version 4.1.3 20080704 (prerelease) (Debian 4.1.2-25)) #1 SMP Sun Jun 21 04:57:38 UTC 2009 -- System Information: Debian Release: squeeze/sid Architecture: i386 (i686) Kernel: Linux 2.6.26-2-686 (SMP w/1 CPU core) Versions of packages linux-image-2.6.26-2-686 depends on: ii debconf [debconf-2.0] 1.5.27 Debian configuration management sy ii initramfs-tools [linux-initra 0.93.4 tools for generating an initramfs ii module-init-tools 3.9-2 tools for managing Linux kernel mo Versions of packages linux-image-2.6.26-2-686 recommends: ii libc6-i686 2.9-23 GNU C Library: Shared libraries [i Versions of packages linux-image-2.6.26-2-686 suggests: ii grub 0.97-55 GRand Unified Bootloader (dummy pa ii grub-legacy [grub] 0.97-55 GRand Unified Bootloader (Legacy v pn linux-doc-2.6.26 <none> (no description available) -- debconf information excluded -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org