summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorThomas Deutschmann <whissi@gentoo.org>2017-09-28 22:54:55 +0200
committerThomas Deutschmann <whissi@gentoo.org>2017-09-28 22:54:55 +0200
commit612f47deca97e8d7ffc2100c1dbc82a602abdf39 (patch)
tree714d18b438413833e38a20af15b6514bb8c7ac61 /glsa-200401-01.xml
parentFix GLSA 201709-27 to reflect previous canonical name for libTIFF (diff)
downloadglsa-612f47deca97e8d7ffc2100c1dbc82a602abdf39.tar.gz
glsa-612f47deca97e8d7ffc2100c1dbc82a602abdf39.tar.bz2
glsa-612f47deca97e8d7ffc2100c1dbc82a602abdf39.zip
GLSA format update
- Dates converted to ISO8601 [Bug #196681] - Reference links changed to HTTPS where available [Bug #630750] See: https://bugs.gentoo.org/196681 See: https://bugs.gentoo.org/630750
Diffstat (limited to 'glsa-200401-01.xml')
-rw-r--r--glsa-200401-01.xml21
1 files changed, 10 insertions, 11 deletions
diff --git a/glsa-200401-01.xml b/glsa-200401-01.xml
index 2ff20019..2922a8bf 100644
--- a/glsa-200401-01.xml
+++ b/glsa-200401-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200401-01">
<title>Linux kernel do_mremap() local privilege escalation vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
which allows for local privelege escalation.
</synopsis>
<product type="ebuild">Kernel</product>
- <announced>January 08, 2004</announced>
- <revised>January 08, 2004: 01</revised>
+ <announced>2004-01-08</announced>
+ <revised>2004-01-08: 01</revised>
<bug>37292</bug>
<access>local</access>
<affected>
@@ -212,15 +211,15 @@
their system:
</p>
<code>
- $> emerge sync
- $> emerge -pv your-favourite-sources
- $> emerge your-favourite-sources
- $> # Follow usual procedure for compiling and installing a kernel.
- $> # If you use genkernel, run genkernel as you would do normally.
+ $&gt; emerge sync
+ $&gt; emerge -pv your-favourite-sources
+ $&gt; emerge your-favourite-sources
+ $&gt; # Follow usual procedure for compiling and installing a kernel.
+ $&gt; # If you use genkernel, run genkernel as you would do normally.
- $> # IF YOUR KERNEL IS MARKED as "remerge required!" THEN
- $> # YOU SHOULD UPDATE YOUR KERNEL EVEN IF PORTAGE
- $> # REPORTS THAT THE SAME VERSION IS INSTALLED.</code>
+ $&gt; # IF YOUR KERNEL IS MARKED as "remerge required!" THEN
+ $&gt; # YOU SHOULD UPDATE YOUR KERNEL EVEN IF PORTAGE
+ $&gt; # REPORTS THAT THE SAME VERSION IS INSTALLED.</code>
</resolution>
<references>
<uri link="http://isec.pl/vulnerabilities/isec-0012-mremap.txt">Vulnerability</uri>