[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

acho difícil alguém bater esta velocidade!



Olá,

    acho que já estão sabendo da última vulnerabilidade do kernel
publicada hoje (05/01/2004).
    o mais interessante é que, algumas horas (talvez minutos) após a
publicação, vários bugfixes já estão sendo divulgados; um deles, da
RH, corrigindo as versões do kernel liberadas com as várias versões
de sua distro; outros estão sendo publicados também.
    abaixo alguns "pastes" para registro:

----------------------Publicação da vulnerabilidade----------------
Date: Mon, 5 Jan 2004 13:30:32 +0100 (CET)
From: Paul Starzetz <ihaquer@isec.pl>
Subject: [Full-Disclosure] Linux kernel mremap vulnerability
To: vulnwatch@vulnwatch.org, full-disclosure@lists.netsys.com,
        bugtraq@securityfocus.com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Synopsis:  Linux kernel do_mremap local privilege escalation
vulnerability
Product:   Linux kernel
Version:   2.2, 2.4 and 2.6 series
Vendor:    http://www.kernel.org/
URL:       http://isec.pl/vulnerabilities/isec-0012-mremap.txt
CVE:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0985
Author:    Paul Starzetz <ihaquer@isec.pl>, Wojciech Purczynski
           <cliph@isec.pl>
Date:      January 5, 2004

----------------BugFix RedHat-----------------------
te: Mon, 5 Jan 2004 07:54 -0500
From: bugzilla@redhat.com
Subject: [Full-Disclosure] [RHSA-2003:417-01] Updated kernel resolves
security vulnerability
To: redhat-watch-list@redhat.com, bugtraq@securityfocus.com,
    full-disclosure@lists.netsys.com
Cc:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory
Synopsis:          Updated kernel resolves security vulnerability
Advisory ID:       RHSA-2003:417-01
Issue date:        2004-01-05
Updated on:        2004-01-05
Product:           Red Hat Linux
Keywords:
Cross references:
Obsoletes:
CVE Names:         CAN-2003-0984
CAN-2003-0985

----------------BugFix EnGarde Secure Linux----------------
Date: Mon, 5 Jan 2004 09:19:34 -0500 (EST)
From: EnGarde Secure Linux <security@guardiandigital.com>
Subject: [Full-Disclosure] [ESA-20040105-001] 'kernel' bug and security
fixes.
To: engarde-security@guardiandigital.com, bugtraq@securityfocus.com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[... algumas linhas cortadas ...]



This update fixes two security issues and one critical bug in the Linux
Kernel shipped with EnGarde Secure Linux.
  
 A summary of the bugs fixed:
    
    * An EnGarde-specific memory leak in the LIDS code has been fixed.
          This memory leak could cause a machine, over time, to freeze
	  up.

    * A security vulnerability in the mremap(2) system call
      was recently discovered by Paul Starzetz.  The incorrect bounds
      checking done in this system call could be exploited by a local 
      user to gain root privileges.

    * The Common Vulnerabilities and Exposures project (cve.mitre.org)
      has assigned the name CAN-2003-0985 to this issue.
					    

  Agora vamos esperar o debian liberar o seu advisory e correção.
 
--
Mario O.de Menezes, Ph.D.  "Many are the plans in a man's heart,
    but IPEN-CNEN/SP is the Lord's purpose that prevails"
http://www.ipen.br/~mario Prov. 19.21



Reply to: