lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20031201213831.GA8690@tsunami.trustix.net>
Date: Mon, 1 Dec 2003 22:38:31 +0100
From: Trustix Security Advisor <tsl@...stix.org>
To: bugtraq@...urityfocus.com
Subject: TSLSA-2003-0046 - kernel


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Bugfix Advisory #2003-0046

Package name:      kernel
Summary:           local root
Date:              2003-12-01
Affected versions: TSL 2.0

- --------------------------------------------------------------------------
Package description:
  The kernel package contains the Linux kernel (vmlinuz), the core of your
  Trustix Secure Linux operating system.  The kernel handles the basic
  functions of the operating system:  memory allocation, process allocation,
  device input and output, etc.

Problem description:
  This update fixes an issue related to bounds checking in the do_brk() 
  function in the Linux kernel versions 2.4.22 and previous.
  
  This issue is known to be exploitable gaining root privileges. 
  
  CVE has assigned the name CAN-2003-0961 to this issue.


Action:
  We recommend that all systems with this package installed be upgraded.

Location:
  All TSL updates are available from
  <URI:http://http.trustix.org/pub/trustix/updates/>
  <URI:ftp://ftp.trustix.org/pub/trustix/updates/>


About Trustix Secure Linux:
  Trustix Secure Linux is a small Linux distribution for servers. With focus
  on security and stability, the system is painlessly kept safe and up to
  date from day one using swup, the automated software updater.


Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.


Public testing:
  These packages have been available for public testing for some time.
  If you want to contribute by testing the various packages in the
  testing tree, please feel free to share your findings on the
  tsl-discuss mailinglist.
  The testing tree is located at
  <URI:http://tsldev.trustix.org/cloud/>

  You may also use swup for public testing of updates:
  
  site {
      class = 0
      location = "http://tsldev.trustix.org/cloud/rdfs/latest.rdf"
      regexp = ".*"
  }
  

Questions?
  Check out our mailing lists:
  <URI:http://www.trustix.org/support/>


Verification:
  This advisory along with all TSL packages are signed with the TSL sign key.
  This key is available from:
  <URI:http://www.trustix.org/TSL-SIGN-KEY>

  The advisory itself is available from the errata pages at
  <URI:http://www.trustix.org/errata/trustix-2.0/>
  or directly at
  <URI:http://www.trustix.org/errata/misc/2003/TSL-2003-0046-kernel.asc.txt>


MD5sums of the packages:
- --------------------------------------------------------------------------
0ebf83e22d3d74559d585ac3ca213caa  2.0/srpms/kernel-2.4.23-1tr.src.rpm
ef4fbc07559d01f2f7b06ab9a245f437  2.0/rpms/kernel-utils-2.4.23-1tr.i586.rpm
6c46b8f55d11896f2456150020a4e8cb  2.0/rpms/kernel-source-2.4.23-1tr.i586.rpm
41de18570a4cfe62a4a7bbe756446e86  2.0/rpms/kernel-smp-2.4.23-1tr.i586.rpm
7dae2aab323fa76d5bd4239333e9d369  2.0/rpms/kernel-firewallsmp-2.4.23-1tr.i586.rpm
1505fdbfca87ceadf5cfa94b196b5562  2.0/rpms/kernel-firewall-2.4.23-1tr.i586.rpm
ea9a564c7924bcce148f489da37cbb4a  2.0/rpms/kernel-doc-2.4.23-1tr.i586.rpm
38716e33e51a9f5bb235b92af94bd68e  2.0/rpms/kernel-BOOT-2.4.23-1tr.i586.rpm
0d92116a0da9dba4a386d13b571db59e  2.0/rpms/kernel-2.4.23-1tr.i586.rpm
- --------------------------------------------------------------------------


TSL Security Team

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/y0TCi8CEzsK9IksRAuheAJ40Dpkb+Xml6hxbk3tn7tGxjAorPwCeKZ5X
48YF9+OZv2VVlEVlcP9qCU4=
=S05D
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ