Linux Security
    Linux Security
    Linux Security

    Debian: kernel MIPs platform update

    Date 27 Feb 2004
    Posted By LinuxSecurity Advisories
    Several local root exploits have been discovered recently in the Linux 2.4.x kernel.
    Debian Security Advisory DSA 450-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    February 27th, 2004            
    - --------------------------------------------------------------------------
    Package        : kernel-source-2.4.19, kernel-patch-2.4.19-mips
    Vulnerability  : several vulnerabilities
    Problem-Type   : local
    Debian-specific: no
    CVE ID         : CAN-2003-0961 CAN-2003-0985 CAN-2004-0077
    Several local root exploits have been discovered recently in the Linux
    kernel.  This security advisory updates the mips kernel 2.4.19 for
    Debian GNU/Linux.  The Common Vulnerabilities and Exposures project
    identifies the following problems that are fixed with this update:
       An integer overflow in brk() system call (do_brk() function) for
       Linux allows a local attacker to gain root privileges.  Fixed
       upstream in Linux 2.4.23.
       Paul Starzetz discovered a flaw in bounds checking in mremap() in
       the Linux kernel (present in version 2.4.x and 2.6.x) which may
       allow a local attacker to gain root privileges.  Version 2.2 is not
       affected by this bug.  Fixed upstream in Linux 2.4.24.
       Paul Starzetz and Wojciech Purczynski of discovered a
       critical security vulnerability in the memory management code of
       Linux inside the mremap(2) system call.  Due to missing function
       return value check of internal functions a local attacker can gain
       root privileges.  Fixed upstream in Linux 2.4.25 and 2.6.3.
    For the stable distribution (woody) these problems have been fixed in
    version 2.4.19-0.020911.1.woody3 of mips images and version
    2.4.19-4.woody1 of kernel source.
    For the unstable distribution (sid) this problem will be fixed soon
    with the next upload of a 2.4.19 kernel image and in version
    2.4.22-0.030928.3 for 2.4.22.
    We recommend that you upgrade your Linux kernel packages immediately.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      672 7bbdd141827b2a7c6e5d3dc0ec1419aa
          Size/MD5 checksum:    40736 2a4fa2f28b3af1ba4247255cf1cab05d
          Size/MD5 checksum: 32000211 237896fbb45ae652cc9c5cecc9b746da
          Size/MD5 checksum:      792 767aee163c5c3fccbddf1f917d06488c
          Size/MD5 checksum:  1020287 80c1f72a99eaf113161c589ec49b06f6
      Architecture independent components:
          Size/MD5 checksum:  1782662 b8ade5f98fcb9f3a5627d688467eddcb
          Size/MD5 checksum: 25892640 b22804d26e298f7f02e51d48d31da2dc
          Size/MD5 checksum:  1020394 ba072ba9f904251c7327ccbeedaa8f20
      Big endian MIPS architecture:
          Size/MD5 checksum:  3918150 d1d65ee7cfabcf71efc5d06ac78f6319
          Size/MD5 checksum:  2075108 8f41b6344fe92ba16e69a623c8e3a9b7
          Size/MD5 checksum:  2075486 e53315d4e51e49d809e83191d945a4f8
          Size/MD5 checksum:    12842 b65ca394f3fe542c68787794ee5a4337
      These files will probably be moved into the stable distribution on
      its next revision.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and

    LinuxSecurity Poll

    No results found.

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.