Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=c42c35661411998d58292fd53f366b662f67f1ac
commit c42c35661411998d58292fd53f366b662f67f1ac Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Tue Feb 12 12:17:21 2008 +0100 FSA369-kernel diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index b5eedc4..c8ceb4f 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -27,6 +27,19 @@ <fsas> <fsa> + <id>369</id> + <date>2008-02-08</date> + <author>vmiklos</author> + <package>kernel</package> + <vulnerable>2.6.22-7sayshell4</vulnerable> + <unaffected>2.6.22-7sayshell5</unaffected> + <bts>http://bugs.frugalware.org/task/2759</bts> + <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0600</cve> + <desc>A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, and gain escalated privileges. + The vulnerability is caused due to the missing verification of parameters within the "vmsplice_to_user()", "copy_from_user_mmap_sem()", and "get_iovec_page_array()" functions in fs/splice.c before using them to perform certain memory operations. This can be exploited to e.g. read or write to arbitrary kernel memory via a specially crafted "vmsplice()" system call. + Successful exploitation allows attackers to e.g. gain "root" privileges.</desc> + </fsa> + <fsa> <id>368</id> <date>2008-02-12</date> <author>vmiklos</author> _______________________________________________ Frugalware-git mailing list [email protected] http://frugalware.org/mailman/listinfo/frugalware-git
