[Frugalware-security] [ FSA-369 ] kernel

vmiklos noreply at frugalware.org
Tue Feb 12 12:17:56 CET 2008


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Frugalware Security Advisory                           FSA-369

Date: 2008-02-08
Package: kernel
Vulnerable versions: <= 2.6.22-7sayshell4
Unaffected versions: >= 2.6.22-7sayshell5
Related bugreport: http://bugs.frugalware.org/task/2759
CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0600

Description
===========

A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, and gain escalated privileges.
The vulnerability is caused due to the missing verification of parameters within the &quot;vmsplice_to_user()&quot;, &quot;copy_from_user_mmap_sem()&quot;, and &quot;get_iovec_page_array()&quot; functions in fs/splice.c before using them to perform certain memory operations. This can be exploited to e.g. read or write to arbitrary kernel memory via a specially crafted &quot;vmsplice()&quot; system call.
Successful exploitation allows attackers to e.g. gain &quot;root&quot; privileges.

Updated Packages
================

Check if you have kernel installed:

	# pacman-g2 -Q kernel

If found, then you should upgrade to the latest version:

	# pacman-g2 -Sy kernel

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: See http://ftp.frugalware.org/pub/README.GPG for info

iD8DBQFHsYBkZ7NElSD1VhkRAonfAJ4zDayptuRfmWYuYB2MqrThIKTk6gCbBwS2
jOV4V6r5wWE6upzP7e1VP0w=
=cQkG
-----END PGP SIGNATURE-----


More information about the Frugalware-security mailing list