Debian: kernel Privilege escalation vulnerability DSA-444-1
Summary
Paul Starzetz and Wojciech Purczynski of isec.pl discovered a critical
security vulnerability in the memory management code of Linux inside
the mremap(2) system call. Due to missing function return value check
of internal functions a local attacker can gain root privileges.
For the stable distribution (woody) this problem has been fixed in
version 011226.16 of ia64 kernel source and images.
Other architectures are or will be mentioned in a separate advisory
respectively or are not affected (m68k).
For the unstable distribution (sid) this problem will be fixed in version
2.4.24-3.
This problem is also fixed in the upstream version of Linux 2.4.25 and
2.6.3.
We recommend that you upgrade your Linux kernel packages immediately.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the inte...