Trustix alert: kernel 2.2.25

Posted by dave on Feb 23, 2004 5:57 AM EDT
Mailing list
Mail this story
Print this story

A hole was discovered in the mremap. Through this hole, it is possible for anyone with a local account on the system to gain root privileges. See CAN-2004-0077 for additional details. This is the kernel 2.2.25 counterpart to the security hole fixed in TSLSA-2004-0007.

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

- -------------------------------------------------------------------------- Trustix Secure Linux Security Advisory #2004-0008

Package name: kernel Summary: local root exploit in mremap Date: 2004-02-23 Affected versions: Trustix 1.5

- -------------------------------------------------------------------------- Package description: The kernel package contains the Linux kernel (vmlinuz), the core of your Trustix Secure Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc.

Problem description: A hole was discovered in the mremap. Through this hole, it is possible for anyone with a local account on the system to gain root privileges. See CAN-2004-0077 for additional details. This is the kernel 2.2.25 counterpart to the security hole fixed in TSLSA-2004-0007. Action: We recommend that all systems with this package installed be upgraded. Please note that if you do not need the functionality provided by this package, you may want to remove it from your system.

Location: All Trustix updates are available from

About Trustix Secure Linux: Trustix Secure Linux is a small Linux distribution for servers. With focus on security and stability, the system is painlessly kept safe and up to date from day one using swup, the automated software updater.

Automatic updates: Users of the SWUP tool can enjoy having updates automatically installed using 'swup --upgrade'.

Public testing: Most updates for Trustix are made available for public testing some time before release. If you want to contribute by testing the various packages in the testing tree, please feel free to share your findings on the tsl-discuss mailinglist. The testing tree is located at

You may also use swup for public testing of updates: site { class = 0 location = "http://tsldev.trustix.org/cloud/rdfs/latest.rdf" regexp = ".*" }

Questions? Check out our mailing lists:

Verification: This advisory along with all Trustix packages are signed with the TSL sign key. This key is available from:

The advisory itself is available from the errata pages at or directly at

MD5sums of the packages: - -------------------------------------------------------------------------- 930eff9735919ec462512f0c227c09d8 1.5/rpms/kernel-2.2.25-10tr.i586.rpm 0188c0cdc4e5420b5e3c7fca3c08e284 1.5/rpms/kernel-BOOT-2.2.25-10tr.i586.rpm 7825bf9d1f906db12b43199c65885816 1.5/rpms/kernel-doc-2.2.25-10tr.i586.rpm 39741df3cca5ecb06b9b6040491dfbcc 1.5/rpms/kernel-headers-2.2.25-10tr.i586.rpm 82d3747c20f621db4f59c39b77e48706 1.5/rpms/kernel-smp-2.2.25-10tr.i586.rpm e7101408e0d692bc9e9cc54b4e4e28af 1.5/rpms/kernel-source-2.2.25-10tr.i586.rpm d0e67804999a1af82e546dea6895f522 1.5/rpms/kernel-utils-2.2.25-10tr.i586.rpm 49c2bc456f011b20eb9a1636963975ee 1.5/srpms/kernel-2.2.25-10tr.src.rpm - --------------------------------------------------------------------------

Trustix Security Team

-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (GNU/Linux)

iD4DBQFAOgmri8CEzsK9IksRAohyAJ9VbK/o0k6sgmBrNYlxlSNMMceINQCYiuaq XHntvVvQTZJo0cvL8bth1Q== =qzj2 -----END PGP SIGNATURE----- _______________________________________________ tsl-announce mailing list [e-mail:tsl-announce@lists.trustix.org] http://lists.trustix.org/mailman/listinfo/tsl-announce

  Nav
» Read more about: Story Type: Security; Groups: Trustix

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.