Gentoo Archives: gentoo-announce

From: Tim Yamin <plasmaroo@g.o>
To: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××.com, security-alerts@×××××××××××××.com, gentoo-core@l.g.o, gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 200402-06 ] Linux kernel AMD64 ptrace vulnerability
Date: Tue, 17 Feb 2004 02:30:41
Message-Id: 40317C24.7050208@gentoo.org
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
5 Gentoo Linux Security Advisory GLSA 200402-06
6 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
7 ~ http://security.gentoo.org
8 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
9
10 ~ Severity: Normal
11 ~ Title: Linux kernel AMD64 ptrace vulnerability
12 ~ Date: February 17, 2004
13 ~ ID: 200402-06
14
15 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
16
17 Synopsis
18 ========
19
20 A vulnerability has been discovered by in the ptrace emulation code for
21 AMD64 platforms when eflags are processed, allowing a local user to
22 obtain elevated priveleges.
23
24 Affected packages
25 =================
26
27 ~ -------------------------------------------------------
28 ~ Kernel / Unaffected Version
29 ~ -------------------------------------------------------
30
31 ~ ck-sources..........................2.6.2-r1...........
32 ~ development-sources.................2.6.2..............
33 ~ gentoo-dev-sources..................2.6.2..............
34 ~ gentoo-sources......................2.4.20-r12.........
35 ~ gs-sources..........................2.4.25_pre7-r1.....
36 ~ vanilla-prepatch-sources............2.4.25_rc3.........
37 ~ vanilla-sources.....................2.4.24-r1..........
38
39 Description
40 ===========
41
42 A vulnerability has been discovered by Andi Kleen in the ptrace
43 emulation code for AMD64 platforms when eflags are processed, allowing a
44 local user to obtain elevated priveleges. The Common Vulnerabilities and
45 Exposures project has assigned CAN-2004-0001 to this issue.
46
47 Impact
48 ======
49
50 ( Only users of the AMD64 platform are affected )
51
52 In this scenario, a user may be able to obtain elevated priveleges,
53 including root access. However, no public exploit is known for the
54 vulnerability at this time.
55
56 Workaround
57 ==========
58
59 There is no temporary workaround - a kernel upgrade is required. A list
60 of unaffected kernels is provided along with this announcement.
61
62 Resolution
63 ==========
64
65 Users are encouraged to upgrade to the latest available sources for
66 their system:
67
68 ~ # emerge sync
69 ~ # emerge -pv your-favorite-sources
70
71 ~ # emerge your-favorite-sources
72
73 ~ # # Follow usual procedures for compiling and installing a kernel.
74 ~ # # If you use genkernel, run genkernel as you would do normally.
75
76 ~ # # See http://www.gentoo.org/doc/en/handbook/handbook.xml for help.
77
78 Concerns?
79 =========
80
81 Security is a primary focus of Gentoo Linux and ensuring the
82 confidentiality and security of our users machines is of utmost
83 importance to us. Any security concerns should be addressed to
84 security@g.o or alternatively, you may file a bug at
85 http://bugs.gentoo.org.
86
87 -----BEGIN PGP SIGNATURE-----
88 Version: GnuPG v1.2.1 (GNU/Linux)
89 Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
90
91 iD8DBQFAMXwiMMXbAy2b2EIRAqDmAKDhG09r3rq6xFlOIB6i6auX1Fcc/ACeO0wE
92 /deJ+dBC2NsZ+bVLmCrHYZQ=
93 =IQWM
94 -----END PGP SIGNATURE-----