nwlogo
NAVIGATION
About
News
Support

Downloads
- Search
- Mirrors
- Auto update

Documentation
- FAQ
- HOWTOs
- ARM info
- Crusoe info

Development
- Toolchain
- Autobuild
- Users

Sponsored by:

Open Source Lab at OSU

LaneChange.net

NetWinder security advisory
ID2004-001
Issued2004-Jan-13
Packagekernel
SummaryKernel vulnerability in mremap() function
CategoryBounds check
SeverityMedium (local privilege escalation)
ProductsGonzo nw-9

DESCRIPTION

A vulnerability in the linux kernel function mremap() has been found. This vulnerability could be exploited by a local attacker to gain root privileges on a system where they already have a user account.

This bug has been fixed in the mainline 2.4.24 kernel; the fix has been backported to 2.4.19 for NetWinder since the later kernels are not yet fully stable on ARM platform.

SOLUTION

Download the following RPM packages to the NetWinder into a temporary directory, then install them with the command "rpm -Uvh *.rpm". Be sure there are no other files ending in ".rpm" in the temporary directory. See http://www.netwinder.org/security/install.html for more help.

Required packages

http://www.netwinder.org/mirror/pub/netwinder/updates/nw-9/armv4l/kernel-2.4.19-10.armv4l.rpm
http://www.netwinder.org/mirror/pub/netwinder/updates/nw-9/armv4l/kernel-headers-2.4.19-10.armv4l.rpm

Optional packages

http://www.netwinder.org/mirror/pub/netwinder/updates/nw-9/SRPMS/kernel-2.4.19-10.src.rpm

REFERENCES

http://www.debian.org/security/2004/dsa-417