[SECURITY] [DSA 440-1] New Linux 2.4.17 packages fix several local root exploits (powerpc/apus)

ID DEBIAN:DSA-440-1:02E59
Type debian
Reporter Debian
Modified 2004-02-18T00:00:00


Debian Security Advisory DSA 440-1 security@debian.org http://www.debian.org/security/ Martin Schulze February 18th, 2004 http://www.debian.org/security/faq

Package : kernel-source-2.4.17, kernel-patch-2.4.17-apus Vulnerability : several vulnerabilities Problem-Type : local Debian-specific: no CVE ID : CAN-2003-0961 CAN-2003-0985 CAN-2004-0077

Several local root exploits have been discovered recently in the Linux kernel. This security advisory updates the PowerPC/Apus kernel for Debian GNU/Linux. The Common Vulnerabilities and Exposures project identifies the following problems that are fixed with this update:


An integer overflow in brk() system call (do_brk() function) for Linux allows a local attacker to gain root privileges. Fixed upstream in Linux 2.4.23.


Paul Starzetz discovered a flaw in bounds checking in mremap() in the Linux kernel (present in version 2.4.x and 2.6.x) which may allow a local attacker to gain root privileges. Version 2.2 is not affected by this bug. Fixed upstream in Linux 2.4.24.


Paul Starzetz and Wojciech Purczynski of isec.pl discovered a critical security vulnerability in the memory management code of Linux inside the mremap(2) system call. Due to missing function return value check of internal functions a local attacker can gain root privileges. Fixed upstream in Linux 2.4.25 and 2.6.3.

For the stable distribution (woody) these problems have been fixed in version 2.4.17-4 of powerpc/apus images.

Other architectures will probably mentioned in a separate advisory or are not affected (m68k).

For the unstable distribution (sid) this problem will be fixed soon.

We recommend that you upgrade your Linux kernel packages immediately.

Upgrade Instructions

wget url will fetch the file for you dpkg -i file.deb will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update will update the internal database apt-get upgrade will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody

Source archives:

  Size/MD5 checksum:      690 f4f41d8b5ce68462139eadff5e340b2f
  Size/MD5 checksum:    38791 17b8f97671d0f1be7c595123bcf0c86c
  Size/MD5 checksum: 29445154 d5de2a4dc49e32c37e557ef856d5d132

  Size/MD5 checksum:      667 beff21e365dba9487c3d1009e6bb8ce7
  Size/MD5 checksum:   489649 3feef2fdda2cb1385e12fb18b33c3787

Architecture independent components:

  Size/MD5 checksum:  1719904 4299b7aeebc01ede7eb5a2f2f5ba0b45
  Size/MD5 checksum: 23878388 15202df8a94f2aa17f09382f520021fc

PowerPC architecture:

  Size/MD5 checksum:  3365696 0f03db43dd1c83a6c02cbd474ae54685
  Size/MD5 checksum:  2210948 1f12b255f6644f144e3426fa5865b27e
  Size/MD5 checksum:     4078 6a495ea4088b900129c60dd769f7da8d
  Size/MD5 checksum:   490346 41eebb692f46cfcb118818048de6d6ad

These files will probably be moved into the stable distribution on its next revision.

For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>