[Subject Prev][Subject Next][Thread Prev][Thread Next][Subject Index][Thread Index]

(fwd) Trustix Security Advisory #2001-0003 - kernel



[Please upgrade to 2.2.19 if you're using any versions of kernel
2.2.x.  All distributions using 2.2.x are vulnerable -- Raju]

This is an RFC 1153 digest.
(1 message)
----------------------------------------------------------------------

Return-Path: <BUGTRAQ@xxxxxxxxxxxxxxxxx>
Approved-By: aleph1@xxxxxxxxxxxxxxxxx
Delivered-To: bugtraq@xxxxxxxxxxxxxxxxxxxxxxx
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.2.5i
Message-ID:  <20010405175944.A6584@xxxxxxxxxxxxxxxxxxx>
Reply-To: tsl@xxxxxxxxxxx
X-To:         tsl-announce@xxxxxxxxxxx
X-cc:         linuxlist@xxxxxxxxxxxxxxxxxx
From: tsl@xxxxxxxxxxx
Sender: Bugtraq List <BUGTRAQ@xxxxxxxxxxxxxxxxx>
To: BUGTRAQ@xxxxxxxxxxxxxxxxx
Subject:      Trustix Security Advisory #2001-0003 - kernel
Date:         Thu, 5 Apr 2001 17:59:44 +0200

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2001-0003

Package name:      kernel
Severity:          Local root exploit
Date:              2001-04-05
Affected versions: TSL 1.01, 1.1, 1.2

- --------------------------------------------------------------------------

Problem description:
	Some time ago, a vulnerability was discovered that allowed for root
	access through ptrace call in the linux kernel.  This was
        originally considered fixed in a previous patch, but as it turns
        out, it wasn't. This is fixed in kernel version 2.2.19.

Action:
  We recommend all systems which has this package installed to be upgraded.
  Please see the Kernel Upgrade Howto, available from
  <URL:http://www.trustix.net/doc/kernel-upgrade/kernel-upgrade.html>
  for more information on how to upgrade your TSL kernel.

Location:
  All TSL updates are available from
  <URL:http://www.trustix.net/pub/Trustix/updates/>
  <URL:ftp://ftp.trustix.net/pub/Trustix/updates/>

Users of the SWUP tool, can enjoy having the security updates
automatically installed using 'swup --upgrade'.

Get SWUP from:
ftp://ftp.trustix.net/pub/Trustix/software/swup/

Note that you may not want to use SWUP to do unattended kernel upgrades,
and it does not do so by default.

Questions?
Check out our mailinglists:
http://www.trustix.net/support/


Verification:
This advisory is signed with the TSL sign key.  It is available from:
http://www.trustix.net/TSL-GPG-KEY


Trustix Security Team

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE6zI25wRTcg4BxxS0RAnTXAJ9e/T9ysKpK9TQnXhP7V2aXsCiArgCdF12s
K17kWuT59qtzxW64YMduZFQ=
=m9sm
-----END PGP SIGNATURE-----
--
Trustix Secure Linux Advisor
Homepage:           http://www.trustix.net/
Errata:             http://www.trustix.net/errata/
Automatic updates:  http://www.trustix.net/pub/Trustix/software/swup/

------------------------------

End of this Digest
******************

-- 
Raju Mathur          raju@xxxxxxxxxxxxx           http://kandalaya.org/