kernel
Page content
- Author: Miklos Vajna
- Vulnerable: 2.6.37-2
- Unaffected: 2.6.37-3nexon1
Secutity issues have been reported in the Linux kernel:
- The start_code and end_code values in “/proc/[pid]/stat” were not protected. In certain scenarios, this flaw could be used to defeat Address Space Layout Randomization (ASLR).
- An integer signedness flaw in drm_modeset_ctl() could allow a local, unprivileged user to cause a denial of service or escalate their privileges.
- A flaw in dev_load() could allow a local user who has the CAP_NET_ADMIN capability to load arbitrary modules from “/lib/modules/”, instead of only netdev modules.
- When a DNS resolver key is instantiated with an error indication, attempts to read that key resulted in an oops because user_read() expected there to be a payload - and there wasn’t one.
- Bug Tracker URL: http://bugs.frugalware.org/task/4489