|Category:||Debian Local Security Checks|
|Title:||Debian Security Advisory DSA 2714-1 (kfreebsd-9 - programming error)|
|Summary:||Konstantin Belousov and Alan Cox discovered that insufficient permission;checks in the memory management of the FreeBSD kernel could lead to;privilege escalation.|
Konstantin Belousov and Alan Cox discovered that insufficient permission
checks in the memory management of the FreeBSD kernel could lead to
kfreebsd-9 on Debian Linux
For the stable distribution (wheezy), this problem has been fixed in
For the unstable distribution (sid), this problem has been fixed in
We recommend that you upgrade your kfreebsd-9 packages.
Common Vulnerability Exposure (CVE) ID: CVE-2013-2171|
Debian Security Information: DSA-2714 (Google Search)
FreeBSD Security Advisory: FreeBSD-SA-13:06
|Copyright||Copyright (C) 2013 Greenbone Networks GmbH http://greenbone.net|
|This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.