-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2714-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff June 25, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : kfreebsd-9 Vulnerability : programming error Problem type : remote Debian-specific: no CVE ID : CVE-2013-2171 Konstantin Belousov and Alan Cox discovered that insufficient permission checks in the memory management of the FreeBSD kernel could lead to privilege escalation. For the stable distribution (wheezy), this problem has been fixed in version 9.0-10+deb70.2. For the unstable distribution (sid), this problem has been fixed in version 9.0-12. We recommend that you upgrade your kfreebsd-9 packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iEYEARECAAYFAlHJ0doACgkQXm3vHE4uylqjLwCg4KRLRjp4uRk6HFyQq9QwBdPx BjkAoJ8vtwiijYd1MUuQnQocDSD5kNJH =KyCc -----END PGP SIGNATURE-----