Users login

Create an account »


Users login

Home » Hacking News » Debian DSA 276-1: kernel local privilege escalation

Debian DSA 276-1: kernel local privilege escalation

by Nikola Strahija on April 4th, 2003 A vulnerability exists in kernel version 2.2.x and 2.4.x which allows local users to obtain root privileges by using ptrace.

Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 276-1 [email protected] Martin Schulze
April 3rd, 2003
- --------------------------------------------------------------------------

Packages : kernel-patch-2.4.17-s390, kernel-image-2.4.17-s390
Vulnerability : local privilege escalation
Problem-Type : local
Debian-specific: no
CVE Id : CAN-2003-0127

The kernel module loader in Linux 2.2 and Linux 2.4 kernels has a flaw
in ptrace. This hole allows local users to obtain root privileges by
using ptrace to attach to a child process that is spawned by the
kernel. Remote exploitation of this hole is not possible.

This advisory only covers kernel packages for the S/390 architecture.
Other architectures will be covered by separate advisories.

For the stable distribution (woody) this problem has been fixed in the
following versions:
kernel-patch-2.4.17-s390: version 0.0.20020816-0.woody.1.1
kernel-image-2.4.17-s390: version 2.4.17-2.woody.2.2

The old stable distribution (potato) is not affected by this problem
for this architecture since s390 was first released with Debian
GNU/Linux 3.0 (woody).

For the unstable distribution (sid) this problem will be fixed soon.

We recommend that you upgrade your kernel-images packages immediately.

Upgrade Instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- --------------------------------

Source archives:
Size/MD5 checksum: 793 797d475344401f5fb9ad14deb88cd9eb
Size/MD5 checksum: 6640 0fa8c3bc6c33d5fe47200e2e78c895fb
Size/MD5 checksum: 338001 5979fbe7c3325033536dfd3914e22dbd
Size/MD5 checksum: 766 4ed91ba4468490b1f000f2f50fefcfcd
Size/MD5 checksum: 7041 aa4841ee18ad551085aac60b2afd156f

Architecture independent components:
Size/MD5 checksum: 301464 691bc1a529cb6125bb04ca43d795c139

IBM S/390 architecture:
Size/MD5 checksum: 3316464 5e748d0b8376f80bcbc6f1fea8d73b64
Size/MD5 checksum: 1339368 fa1ff23854a5ae570efec050bc42eb13

These files will probably be moved into the stable distribution on
its next revision.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: [email protected]
Package info: `apt-cache show ' and

Version: GnuPG v1.2.1 (GNU/Linux)


Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.


Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »