Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=802b67e5253a76fa524baad0a66d719e475e86e0
commit 802b67e5253a76fa524baad0a66d719e475e86e0 Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Tue Mar 4 17:51:23 2008 +0100 FSA372-kernel diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index eec0d04..9ebf741 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -27,6 +27,20 @@ <fsas> <fsa> + <id>372</id> + <date>2008-03-04</date> + <author>vmiklos</author> + <package>kernel</package> + <vulnerable>2.6.22-7sayshell5</vulnerable> + <unaffected>2.6.22-7sayshell6</unaffected> + <bts>http://bugs.frugalware.org/task/2834</bts> + <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0007</cve> + <desc>A vulnerability have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information or gain escalated privileges. + The vulnerability is caused due to certain drivers with registered page fault handlers not correctly preventing size expansions of mapped memory regions beyond the originally allocated size. This can be exploited to gain access to other memory areas via e.g. the "mremap()" system call. + Successful exploitation may allow local attackers to disclose and manipulate kernel memory, which potentially can be leveraged to gain escalated privileges. + </desc> + </fsa> + <fsa> <id>371</id> <date>2008-02-26</date> <author>vmiklos</author> _______________________________________________ Frugalware-git mailing list [email protected] http://frugalware.org/mailman/listinfo/frugalware-git
