Linux Security
Linux Security
Linux Security

Debian: New Linux kernel 2.6.8 packages fix privilege escalation

Date 16 Jul 2006
Posted By LinuxSecurity Advisories
Updated package.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 1111-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.                               Dann Frazier
Jul 16th, 2006                
- --------------------------------------------------------------------------

Package        : kernel-source-2.6.8 et. al.
Vulnerability  : race condition
Problem-Type   : local
Debian-specific: no
CVE ID         : CVE-2006-3625

It was discovered that a race condition in the process filesystem can lead
to privilege escalation.

The following matrix explains which kernel version for which architecture
fixes the problem mentioned above:

                                 Debian 3.1 (sarge)
     Source                      2.6.8-16sarge4
     Alpha architecture          2.6.8-16sarge4
     AMD64 architecture          2.6.8-16sarge4
     Intel IA-32 architecture    2.6.8-16sarge4
     Intel IA-64 architecture    2.6.8-14sarge4
     PowerPC architecture        2.6.8-12sarge4
     Sun Sparc architecture      2.6.8-15sarge4

As an exploit for this issue in the wild, this advisory was sent out without
builds for the IBM S/390, Motorola 680x0 and HP Precision architectures being
available. They will be released in a followup-advisory as soon as they
are available. Also, the kernels for the FAI installer haven't been updated
yet. As a workaround we recommend to mount proc with the nosuid and noexec

We recommend that you upgrade your kernel package immediately and reboot
the machine. If you have built a custom kernel from the kernel source
package, you will need to rebuild to take advantage of these fixes.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:
      Size/MD5 checksum:      812 ff4792fd28cadb6774ae4310ce38e301
      Size/MD5 checksum:    38839 e4d527c319269df165cc23fd6fb54a68
      Size/MD5 checksum:     1103 7dc33f6d9079af9d79b05d6ece3dfdc5
      Size/MD5 checksum:    75714 264ee72864b022045cc4b0820fe062db
      Size/MD5 checksum:     1191 0fb79cfacfc5581263710440357ed5ce
      Size/MD5 checksum:    64204 02b5b536eebb207995ef3a754de1c87e
      Size/MD5 checksum:     1047 62f42ea9f118d911a8f215af2f3e586d
      Size/MD5 checksum:    90861 885cb72bd69153dcd6512db147caa173
      Size/MD5 checksum:     1036 00d330ff015d713c4652ea05c5555f91
      Size/MD5 checksum:    24447 393b640388a78dd98c727a08f972214c
      Size/MD5 checksum:     1002 bca4e80e8a10ba3c0884e3fab032772b
      Size/MD5 checksum:  1044761 b6675f6ac09f5d31f780650798c5609c
      Size/MD5 checksum: 43929719 0393c05ffa4770c3c5178b74dc7a4282
      Size/MD5 checksum:     1071 4bb132bef3f8f2a220ad9e74ab76500e
      Size/MD5 checksum:    27031 59fb7f129abc85794829e1e777b540a0

  Architecture independent components:
      Size/MD5 checksum:  6183402 a4efe296e5fd14d33c6b1ae1f40265c3
      Size/MD5 checksum:  1081512 562d408fa5cd936f557eceb74621bff2
      Size/MD5 checksum: 34943124 7b65a57ca6a2376d8042143244b8f5ab
      Size/MD5 checksum:    35134 80f1a94b1542bf3f89bd77d0a69c67c4

  Alpha architecture:
      Size/MD5 checksum:  2759858 310b0ddfee56412d0fdf827fbb53ad04
      Size/MD5 checksum:   232256 264fb1d8c9107950918e02b3c8d1b2c5
      Size/MD5 checksum:   227366 3c43da6bd0a369e67be02af8e3498d60
      Size/MD5 checksum: 20220764 714e37e85c5387ef44ef8ca96608934a
      Size/MD5 checksum: 20073926 24005f33bb551a3dec6cdbbdae45efdf

  Intel IA-32 architecture:
      Size/MD5 checksum:  2722664 c435fecd5d9cbda8f337c3cd86fc0dca
      Size/MD5 checksum:   226110 94d5814aed329864cad5d1584a5d44e2
      Size/MD5 checksum:   225244 d8128cc1a753402d41ce2b7ddcee875a
      Size/MD5 checksum:   221102 76161094b4af81690b489010912ad94d
      Size/MD5 checksum:   223202 89d8a6a610eccf151bdbd38f7467731c
      Size/MD5 checksum:   219462 9eb4bace25ae262ac51c45617661f3be
      Size/MD5 checksum: 12561704 c3ffffed8671d53630c176618d12fbc9
      Size/MD5 checksum: 13257210 a4d1fac79a380edbe4284659428f7623
      Size/MD5 checksum: 13219086 a578d5400499044678959c16e8839153
      Size/MD5 checksum: 13217374 1b4965fe7b97de4e24075ea3541a21fd
      Size/MD5 checksum: 13190288 417cafc0fc4dd74032fc9f184ecb8659
      Size/MD5 checksum:  2779472 3c3d561576b2bbcae74806518f2d526f
      Size/MD5 checksum:   258572 b6ef0ead4cbbd2f4700613fae13ecad6
      Size/MD5 checksum:   256372 3bcb4f79630757e495377f140c055c5a
      Size/MD5 checksum:   253422 fd1d4a2ff14ea852098b41435a8dd8f2
      Size/MD5 checksum:   256716 9369c6b0c81fe61fe0640fbbb5d295a3
      Size/MD5 checksum:   253512 027cb58c47a72a2fb0303d98988e5ec0
      Size/MD5 checksum: 14063498 847b68ff55485cd1cfdef9b951a27639
      Size/MD5 checksum: 15536232 d3974ee45e891069362eed6af842bcfd
      Size/MD5 checksum: 15346658 a52d56df265fe38bb822e3a09ce627e4
      Size/MD5 checksum: 15261024 8e67b0d239fc9ca47db18ed49b42a083
      Size/MD5 checksum: 15124402 16d13d0ef23a03258fdca8dffeae8cc6

  Intel IA-64 architecture:
      Size/MD5 checksum:     6678 75fdf84848419b73b504cf440bb89030
      Size/MD5 checksum:     6750 0583066225780439bc152d5067de73fd
      Size/MD5 checksum:     6706 b9daa129196ea166ccfdd1bfc5528aae
      Size/MD5 checksum:     6776 816a81ea2af11666807310e001413ca2
      Size/MD5 checksum:  3098892 53c416f0b21d13d97b9cafdaf53335fe
      Size/MD5 checksum:   200088 a13df28d82aea874f7f2f7624964a180
      Size/MD5 checksum:   199418 0c89142d3f9bd9dc9bc0945c2c5a5252
      Size/MD5 checksum:   199864 1627d34ecce889ab7feeb079e5e786a5
      Size/MD5 checksum:   199352 1f8fbb0f499928da9afad963240a2a5a
      Size/MD5 checksum:     6676 863e6dbb301810732ca5b967d1348b1d
      Size/MD5 checksum:     6750 a0be1dbee3890815491446c70292af6b
      Size/MD5 checksum:     6702 55fe56f2f3de36221c8c00826e6eca6c
      Size/MD5 checksum:     6774 b00877ca52331c964323b12056cd1f70
      Size/MD5 checksum: 21476370 c9a52f35220d0e3bc61b1f507b7dc716
      Size/MD5 checksum: 22136612 9d6f06b3203fec64ef280bb2147b60ae
      Size/MD5 checksum: 21409268 2a5e1b20baa1a668304e4c6c0ee96f77
      Size/MD5 checksum: 22154522 dd8e2bab100e8447434428d8c3d0cd33

  Sun Sparc architecture:
      Size/MD5 checksum:     5270 d9d8a08c7d95af660ddb27b2bdf3edb2
      Size/MD5 checksum:  2890614 25a5f93a494d583f533d8a8b6afc5811
      Size/MD5 checksum:   110050 ef8055368116c6de685e2e5fb3eb7bc9
      Size/MD5 checksum:   144772 3c49e410afa9020cfb0ed6e7daa1197a
      Size/MD5 checksum:   145386 b5f7c0add8b7f5709235a9a3108b0752
      Size/MD5 checksum:  4551130 87c9d50a7693e0f049ee47e32e1b07ff
      Size/MD5 checksum:  7430922 eceb79d6f7dd483ce5188e7934d1c506
      Size/MD5 checksum:  7628714 3a3dddddba19f112f7b3b93ba5d44642

  PowerPC architecture:
      Size/MD5 checksum:   407398 e05e6f4cc9db78fb380752ffbdeb5da8
      Size/MD5 checksum:   407328 e8a001c81e071b8e20ae1c231a4c6995
      Size/MD5 checksum:   406710 77a65238ea24808cffd01963a1fc1f63
      Size/MD5 checksum:   406636 bbc4a48430c0b9b8e65adb9acb8d7898
      Size/MD5 checksum:   407600 1369ada43ac7d75f21463e4d2f1c2f24
      Size/MD5 checksum:   406756 958b261e91d96f980704c0f3f82b8e6a
      Size/MD5 checksum:  5147646 bf6d33036a5a150d791b09e021154206
      Size/MD5 checksum: 13576992 151c64d944a5ba0f812596ec3c0d87c2
      Size/MD5 checksum: 13929732 a53f72b2554445b5753b905b5306bb90
      Size/MD5 checksum: 13560758 ba215f514c5707a0eade2cc11f2bb0ff
      Size/MD5 checksum: 13921224 0fab2af9083ebfc6d70d09c1d35affc2
      Size/MD5 checksum: 13595362 6dc1b4542ce1738258d3529900c16b5d
      Size/MD5 checksum: 13847816 9f0c9b62f6ef32fc3c16263db5a6c988

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"41","type":"x","order":"1","pct":83.67,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"4","type":"x","order":"2","pct":8.16,"resources":[]},{"id":"181","title":"Hardly ever","votes":"4","type":"x","order":"3","pct":8.16,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.