[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20040218120648.GA5926@tsunami.trustix.net>
Date: Wed, 18 Feb 2004 13:06:48 +0100
From: Trustix Security Advisor <tsl@...stix.org>
To: bugtraq@...urityfocus.com
Subject: TSLSA-2004-0007 - kernel
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2004-0007
Package name: kernel
Summary: local root exploit in mremap
Date: 2004-02-18
Affected versions: Trustix 2.0
- --------------------------------------------------------------------------
Package description:
The kernel package contains the Linux kernel (vmlinuz), the core of your
Trustix Secure Linux operating system. The kernel handles the basic
functions of the operating system: memory allocation, process allocation,
device input and output, etc.
Problem description:
A hole was discovered in the mremap. Through this hole, it is possible
for anyone with a local account on the system to gain root privileges.
See CAN-2004-0077 for additional details. This is not the same
vulnerability that was previously patched in TSL-2004-0001.
Action:
We recommend that all systems with this package installed be upgraded.
Please note that if you do not need the functionality provided by this
package, you may want to remove it from your system.
Location:
All Trustix updates are available from
<URI:http://http.trustix.org/pub/trustix/updates/>
<URI:ftp://ftp.trustix.org/pub/trustix/updates/>
About Trustix Secure Linux:
Trustix Secure Linux is a small Linux distribution for servers. With focus
on security and stability, the system is painlessly kept safe and up to
date from day one using swup, the automated software updater.
Automatic updates:
Users of the SWUP tool can enjoy having updates automatically
installed using 'swup --upgrade'.
Public testing:
Most updates for Trustix are made available for public testing some time
before release.
If you want to contribute by testing the various packages in the
testing tree, please feel free to share your findings on the
tsl-discuss mailinglist.
The testing tree is located at
<URI:http://tsldev.trustix.org/cloud/>
You may also use swup for public testing of updates:
site {
class = 0
location = "http://tsldev.trustix.org/cloud/rdfs/latest.rdf"
regexp = ".*"
}
Questions?
Check out our mailing lists:
<URI:http://www.trustix.org/support/>
Verification:
This advisory along with all Trustix packages are signed with the
TSL sign key.
This key is available from:
<URI:http://www.trustix.org/TSL-SIGN-KEY>
The advisory itself is available from the errata pages at
<URI:http://www.trustix.org/errata/trustix-2.0/>
or directly at
<URI:http://www.trustix.org/errata/misc/2004/TSL-2004-0007-kernel.asc.txt>
MD5sums of the packages:
- --------------------------------------------------------------------------
bc7e748ac8f582bb1d1b3fad6d0acc26 2.0/rpms/kernel-2.4.24-3tr.i586.rpm
e784b6c39aea52cb2c231179da53049c 2.0/rpms/kernel-BOOT-2.4.24-3tr.i586.rpm
ec5c931ba06a385c42a10339f111c4a3 2.0/rpms/kernel-doc-2.4.24-3tr.i586.rpm
e446d91182430ba4c90c5baf6d5c0906 2.0/rpms/kernel-firewall-2.4.24-3tr.i586.rpm
102a632d38467f9d9b07863135b4a6b8 2.0/rpms/kernel-firewallsmp-2.4.24-3tr.i586.rpm
4a798381b92450a250e9bdbde6948d87 2.0/rpms/kernel-smp-2.4.24-3tr.i586.rpm
d22d88df0c0b575f07923b22e07243a2 2.0/rpms/kernel-source-2.4.24-3tr.i586.rpm
23d4bb2286fa112c281e9d82fd1e8516 2.0/rpms/kernel-utils-2.4.24-3tr.i586.rpm
4095379f051eb7e005ec06c0ef5538dc 2.0/srpms/kernel-2.4.24-3tr.src.rpm
- --------------------------------------------------------------------------
Trustix Security Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
iD8DBQFAM0Fhi8CEzsK9IksRAjbZAKC1eC+qT1NYhfRWoYIZyUzU3h+J4ACeNalH
hC8vRvUB0Yp1mkUu5bNcYDw=
=Lthb
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists