[Frugalware-security] [ FSA-369 ] kernel
noreply at frugalware.org
Tue Feb 12 12:17:56 CET 2008
-----BEGIN PGP SIGNED MESSAGE-----
Frugalware Security Advisory FSA-369
Vulnerable versions: <= 2.6.22-7sayshell4
Unaffected versions: >= 2.6.22-7sayshell5
Related bugreport: http://bugs.frugalware.org/task/2759
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, and gain escalated privileges.
The vulnerability is caused due to the missing verification of parameters within the "vmsplice_to_user()", "copy_from_user_mmap_sem()", and "get_iovec_page_array()" functions in fs/splice.c before using them to perform certain memory operations. This can be exploited to e.g. read or write to arbitrary kernel memory via a specially crafted "vmsplice()" system call.
Successful exploitation allows attackers to e.g. gain "root" privileges.
Check if you have kernel installed:
# pacman-g2 -Q kernel
If found, then you should upgrade to the latest version:
# pacman-g2 -Sy kernel
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: See http://ftp.frugalware.org/pub/README.GPG for info
-----END PGP SIGNATURE-----
More information about the Frugalware-security