- - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200303-17
- - ---------------------------------------------------------------------

          PACKAGE : kernel
          SUMMARY : ptrace flaw
             DATE : 2003-03-21 08:59 UTC
          EXPLOIT : local
VERSIONS AFFECTED : All except 2.5
    FIXED VERSION : Kernels with patch applied
              CVE : CAN-2003-0127

- - ---------------------------------------------------------------------

- From advisory:

"The Linux 2.2 and Linux 2.4 kernels have a flaw in ptrace. This hole 
allows local users to obtain full privileges. Remote exploitation of 
this hole is not possible. Linux 2.5 is not believed to be vulnerable."

Read the full advisory at: 
http://marc.theaimsgroup.com/?l=linux-kernel&m=104791735604202&w=2

SOLUTION

It is recommended that all Gentoo Linux users upgrade their kernels.

If you are running any of gentoo-sources, gs-sources, pfeifer-sources
sparc-sources or xfs-sources updates are available. Sync your tree and 
run emerge  to install the latest version of the package. Then
compile and install your new kernel and reboot.

If you are using an other kernel package which hasn't been updated or 
download your own sources you can download a patch from  
 /linux-2.4.20-ptrace.patch
and manually patch your kernel.

- - ---------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at   
- - ---------------------------------------------------------------------

Gentoo: kernel ptrace vulnerability

The Linux 2.2 and Linux 2.4 kernels have a flaw in ptrace

Summary


- - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200303-17
- - ---------------------------------------------------------------------
    FIXED VERSION : Kernels with patch applied

- - ---------------------------------------------------------------------
- From advisory:
"The Linux 2.2 and Linux 2.4 kernels have a flaw in ptrace. This hole allows local users to obtain full privileges. Remote exploitation of this hole is not possible. Linux 2.5 is not believed to be vulnerable."
Read the full advisory at: http://marc.theaimsgroup.com/?l=linux-kernel&m=104791735604202&w=2
SOLUTION
It is recommended that all Gentoo Linux users upgrade their kernels.
If you are running any of gentoo-sources, gs-sources, pfeifer-sources sparc-sources or xfs-sources updates are available. Sync your tree and run emerge to install the latest version of the package. Then compile and install your new kernel and reboot.
If you are using an other kernel package which hasn't been updated or download your own sources you can download a patch from /linux-2.4.20-ptrace.patch and manually patch your kernel.
- - --------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at - - ---------------------------------------------------------------------

Resolution

References

Availability

Concerns

Severity
PACKAGE : kernel
SUMMARY : ptrace flaw
DATE : 2003-03-21 08:59 UTC
EXPLOIT : local
VERSIONS AFFECTED : All except 2.5
CVE : CAN-2003-0127

Synopsis

Background

Affected Packages

Impact

Workaround

Related News