Package: kernel-patch-grsecurity2 Version: 2.1.5-1 Severity: important Tags: security
A vulnerability has been reported in grsecurity, which can be exploited by malicious, local users to gain escalated privileges. The vulnerability is caused due to an unspecified error within the "expand_stack()" function, which may allow execution of arbitrary code with root privileges. Reference: http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-0257 http://www.securityfocus.com/bid/22014 Note: Please mention the CVE id in the changelog. -- System Information: Debian Release: 4.0 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-3-486 Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8) regards, -- .''`. : :' : Alex de Oliveira Silva | enerv `. `' www.enerv.net `- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

