Package: kernel-patch-grsecurity2
Version: 2.1.5-1
Severity: important
Tags: security

A vulnerability has been reported in grsecurity, which can be exploited by 
malicious, 
local users to gain escalated privileges.
The vulnerability is caused due to an unspecified error within the 
"expand_stack()" 
function, which may allow execution of arbitrary code with root privileges.

Reference:
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-0257
http://www.securityfocus.com/bid/22014

Note:
Please mention the CVE id in the changelog.


-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-3-486
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8)


regards,
-- 
   .''`.  
  : :' :    Alex de Oliveira Silva | enerv
  `. `'     www.enerv.net
    `- 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to