Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=c42c35661411998d58292fd53f366b662f67f1ac

commit c42c35661411998d58292fd53f366b662f67f1ac
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Tue Feb 12 12:17:21 2008 +0100

FSA369-kernel

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index b5eedc4..c8ceb4f 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -27,6 +27,19 @@

<fsas>
<fsa>
+               <id>369</id>
+               <date>2008-02-08</date>
+               <author>vmiklos</author>
+               <package>kernel</package>
+               <vulnerable>2.6.22-7sayshell4</vulnerable>
+               <unaffected>2.6.22-7sayshell5</unaffected>
+               <bts>http://bugs.frugalware.org/task/2759</bts>
+               
<cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0600</cve>
+               <desc>A vulnerability has been reported in the Linux Kernel, 
which can be exploited by malicious, local users to cause a DoS (Denial of 
Service), disclose potentially sensitive information, and gain escalated 
privileges.
+                       The vulnerability is caused due to the missing 
verification of parameters within the "vmsplice_to_user()", 
"copy_from_user_mmap_sem()", and "get_iovec_page_array()" functions in 
fs/splice.c before using them to perform certain memory operations. This can be 
exploited to e.g. read or write to arbitrary kernel memory via a specially 
crafted "vmsplice()" system call.
+                       Successful exploitation allows attackers to e.g. gain 
"root" privileges.</desc>
+       </fsa>
+       <fsa>
<id>368</id>
<date>2008-02-12</date>
<author>vmiklos</author>
_______________________________________________
Frugalware-git mailing list
[email protected]
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to