drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mangelnde Rechteprüfung in kfreebsd-9
Name: |
Mangelnde Rechteprüfung in kfreebsd-9 |
|
ID: |
DSA-2714-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian sid, Debian wheezy |
|
Datum: |
Di, 25. Juni 2013, 22:41 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2171 |
|
Applikationen: |
kfreebsd-9 |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
- ------------------------------------------------------------------------- Debian Security Advisory DSA-2714-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff June 25, 2013 http://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : kfreebsd-9 Vulnerability : programming error Problem type : remote Debian-specific: no CVE ID : CVE-2013-2171
Konstantin Belousov and Alan Cox discovered that insufficient permission checks in the memory management of the FreeBSD kernel could lead to privilege escalation.
For the stable distribution (wheezy), this problem has been fixed in version 9.0-10+deb70.2.
For the unstable distribution (sid), this problem has been fixed in version 9.0-12.
We recommend that you upgrade your kfreebsd-9 packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)
iEYEARECAAYFAlHJ0doACgkQXm3vHE4uylqjLwCg4KRLRjp4uRk6HFyQq9QwBdPx BjkAoJ8vtwiijYd1MUuQnQocDSD5kNJH =KyCc -----END PGP SIGNATURE-----
-- To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org Archive: http://lists.debian.org/20130625172340.GA5826@pisco.westfalen.local
|
|
|
|