[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
rPath Security Advisory: 2008-0048-1
rPath Linux 1
Exposure Level Classification:
Local User Deterministic Privilege Escalation
rPath Issue Tracking System:
Previous versions of the kernel package have several vulnerabilities
resolved in this release. The most severe could allow local users
to read or write kernel memeory.
In addition, a bug that caused the kernel Out of Memory handler to
kill processes on systems with 4 or more GiB of RAM and 2 or more CPUs
has been fixed.
A system reboot is required to resolve these issues.
Copyright 2008 rPath, Inc.
This file is distributed under the terms of the MIT License.
A copy is available at http://www.rpath.com/permanent/mit-license.html