Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=65c6b94b823818a643af01516ec039f539cced04

commit 65c6b94b823818a643af01516ec039f539cced04
Author: Miklos Vajna <[email protected]>
Date:   Fri Aug 14 14:45:30 2009 +0200

FSA615-kernel

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index 6f92103..065d139 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -26,6 +26,21 @@

<fsas>
<fsa>
+               <id>615</id>
+               <date>2009-08-14</date>
+               <author>Miklos Vajna</author>
+               <package>kernel</package>
+               <vulnerable>2.6.28-6anacreon1</vulnerable>
+               <unaffected>2.6.28-6anacreon2</unaffected>
+               <bts>http://bugs.frugalware.org/task/3881</bts>
+               <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1895
+                       
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2406
+                       
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2407</cve>
+               <desc>1) The personality subsystem in the Linux kernel before 
2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the 
ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid 
program, which makes it easier for local users to leverage the details of 
memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the 
mmap_min_addr protection mechanism, or (3) defeat address space layout 
randomization (ASLR).
+                       2) Stack-based buffer overflow in the 
parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs 
subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a 
denial of service (system crash) or possibly gain privileges via vectors 
involving a crafted eCryptfs file, related to not ensuring that the key 
signature length in a Tag 11 packet is compatible with the key signature buffer 
size.
+                       3) Heap-based buffer overflow in the parse_tag_3_packet 
function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux 
kernel before 2.6.30.4 allows local users to cause a denial of service (system 
crash) or possibly gain privileges via vectors involving a crafted eCryptfs 
file, related to a large encrypted key size in a Tag 3 packet.</desc>
+       </fsa>
+       <fsa>
<id>614</id>
<date>2009-07-26</date>
<author>Miklos Vajna</author>
_______________________________________________
Frugalware-git mailing list
[email protected]
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to