Users login

Create an account »

JOIN XATRIX

Users login

Home » Security Advisories» Trustix » Kernel local root exploit

Kernel local root exploit

There is an integer overflow in the SCTP code in the Linux kernel starting with 2.4.23-pre5 and up to and including 2.4.25. This could allow for a local root exploit.

  • Vendor: Trustix
  • Vendor ID: TSLSA-2004-0029
  • Date: May 13, 2004


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2004-0029

Package name: kernel
Summary: local root
Date: 2004-05-13
Affected versions: Trustix Secure Linux 2.0
Trustix Secure Linux 2.1
Trustix Secure Enterprise Linux 2

- --------------------------------------------------------------------------
Package description:
The kernel package contains the Linux kernel (vmlinuz), the core of your
Trustix Secure Linux operating system. The kernel handles the basic
functions of the operating system: memory allocation, process allocation,
device input and output, etc.


Problem description:
There is an integer overflow in the SCTP code in the Linux kernel starting
with 2.4.23-pre5 and up to and including 2.4.25. This could allow for
a local root exploit.


Action:
We recommend that all systems with this package installed be upgraded.


Location:
All Trustix Secure Linux updates are available from




About Trustix Secure Linux:
Trustix Secure Linux is a small Linux distribution for servers. With focus
on security and stability, the system is painlessly kept safe and up to
date from day one using swup, the automated software updater.


Automatic updates:
Users of the SWUP tool can enjoy having updates automatically
installed using 'swup --upgrade'.


Public testing:
Most updates for Trustix Secure Linux are made available for public
testing some time before release.
If you want to contribute by testing the various packages in the
testing tree, please feel free to share your findings on the
tsl-discuss mailinglist.
The testing tree is located at


You may also use swup for public testing of updates:

site {
class = 0
location = "http://tsldev.trustix.org/horizon/rdfs/latest.rdf"
regexp = ".*"
}


Questions?
Check out our mailing lists:



Verification:
This advisory along with all Trustix packages are signed with the
TSL sign key.
This key is available from:


The advisory itself is available from the errata pages at
and

or directly at



MD5sums of the packages:
- --------------------------------------------------------------------------
eeeaf33d8d9bcbc7a21529a8950476f5 TSEL-2/kernel-2.4.26-1tr.i586.rpm
0e6200765dbec0dcc085137adabaacd0 TSEL-2/kernel-BOOT-2.4.26-1tr.i586.rpm
0edde099e9376684ba17ac179fa06feb TSEL-2/kernel-doc-2.4.26-1tr.i586.rpm
5956c35f807165228ec94559fb30be4b TSEL-2/kernel-firewall-2.4.26-1tr.i586.rpm
cecd6f7a2cf5edb24e3ddbfe132bedd9 TSEL-2/kernel-firewallsmp-2.4.26-1tr.i586.rpm
04a04a7821b5caaccd346b406f6f2548 TSEL-2/kernel-smp-2.4.26-1tr.i586.rpm
1ea36a2d9b6bd6aa0d47f88a66dd6f21 TSEL-2/kernel-source-2.4.26-1tr.i586.rpm
40452d3190f71b76beed0226af9a9865 TSEL-2/kernel-utils-2.4.26-1tr.i586.rpm
85fbe89ee3c1bf70eefe6acb89aa677c 2.1/rpms/kernel-2.4.26-1tr.i586.rpm
cf9b729feedd6e4010a0e2d0b8fac6ec 2.1/rpms/kernel-BOOT-2.4.26-1tr.i586.rpm
b591fc164a582be62cd3035b4166d5f9 2.1/rpms/kernel-doc-2.4.26-1tr.i586.rpm
61bb7c56d05697d5497c33b3e7f3e8c3 2.1/rpms/kernel-firewall-2.4.26-1tr.i586.rpm
6cbf533d849e0ae9a78250888dfec059 2.1/rpms/kernel-firewallsmp-2.4.26-1tr.i586.rpm
6784d9305e1e65c89e1fb88e5249d739 2.1/rpms/kernel-smp-2.4.26-1tr.i586.rpm
ad03628c2b7a459a58e9f3026d3a3adb 2.1/rpms/kernel-source-2.4.26-1tr.i586.rpm
ea8ad0270f2abebe5fb3e065970f80d8 2.1/rpms/kernel-utils-2.4.26-1tr.i586.rpm
ceb811cb9c0abf0a8d3779665f2281f8 2.0/rpms/kernel-2.4.26-1tr.i586.rpm
a2b9d9a9243651f85f16cab7b086d444 2.0/rpms/kernel-BOOT-2.4.26-1tr.i586.rpm
768c765a935513d6c51bd24ce9031364 2.0/rpms/kernel-doc-2.4.26-1tr.i586.rpm
126fde71a2727ccb344df4d340e07d4e 2.0/rpms/kernel-firewall-2.4.26-1tr.i586.rpm
fc73d5d8ac5488a5983f55d9597b142d 2.0/rpms/kernel-firewallsmp-2.4.26-1tr.i586.rpm
28920e2fa00b42997c077f6bbdf71d5e 2.0/rpms/kernel-smp-2.4.26-1tr.i586.rpm
2ed295b378848e9a63a3e73f9e3bd97e 2.0/rpms/kernel-source-2.4.26-1tr.i586.rpm
fe68faea42df2c728f00d40ff23438a7 2.0/rpms/kernel-utils-2.4.26-1tr.i586.rpm
- --------------------------------------------------------------------------


Trustix Security Team

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQFApI9Fi8CEzsK9IksRAqZuAJ9rfiBxbD2cVq7PPWL1SdDEuYRYBQCdF5XO
V285YkHJe77bwbBTm+pMSVk=
=6fda
-----END PGP SIGNATURE-----

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »