Gentoo: Kernel buffer overflow vulnerability leading to root
Summary
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
- -------------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200312-02 - --------------------------------------------------------------------------
GLSA: 200312-02 package: kernel summary: A flaw in the do_brk() function of Linux kernel 2.4.22 and earlier can be exploited by local users or malicious services to gain root privileges. severity: high Gentoo bug: 34844 date: 2003-12-04 CVE: CAN-2003-0961 exploit: local affected: <2.4.22 fixed: >=2.4.23 fixed: >=2.4.22+patches
DESCRIPTION:
Lack of proper bounds checking exists in the do_brk() kernel function in Linux kernels prior to 2.4.23. This bug can be used to give a userland program or malicious service access to the full kernel address space and gain root privileges. This issue is known to be exploitable.
All kernel ebuilds in Portage have been bumped or patched and do no...Read the Full Advisory
Resolution
References
Availability
Concerns
Background