Debians sikkerhedsbulletin

DSA-453-1 linux-kernel-2.2.20-i386+m68k+powerpc -- fejlende funktion og TLB-tømning

Rapporteret den:
2. mar 2004
Berørte pakker:
kernel-source-2.2.20
kernel-image-2.2.20-i386
kernel-image-2.2.20-reiserfs-i386
kernel-image-2.2.20-amiga
kernel-image-2.2.20-atari
kernel-image-2.2.20-bvme6000
kernel-image-2.2.20-mac
kernel-image-2.2.20-mvme147
kernel-image-2.2.20-mvme16x
kernel-patch-2.2.20-powerpc
Sårbar:
Ja
Referencer i sikkerhedsdatabaser:
I Bugtraq-databasen (hos SecurityFocus): BugTraq-id 9686.
I Mitres CVE-ordbog: CVE-2004-0077.
CERTs noter om sårbarheder, bulletiner og hændelser: VU#981222.
Yderligere oplysninger:

Paul Starzetz og Wojciech Purczynski fra isec.pl har opdaget en kritisk sikkerhedssårbarhed i hukommelseshåndteringskoden i Linux i systemkaldet mremap(2). På grund for tidlig tømning af TLB'en (Translation Lookaside Buffer, et adressemellemlager) er det muligt for en angriber at iværksætte en lokal root-udnyttelse.

Angrebsparametrene gælder dog kun kerneserierne 2.4.x og 2.2.x. Før troede vi at den udnytbare sårbarhed i 2.4.x ikke fandtes i 2.2.x, hvilket stadig er korrekt. Dog har det vist sig at en anden men tilsvarende sårbarhed (eller noget i den retning) faktisk kan udnyttes i 2.2.x, men ikke i 2.4.x.

I den stabile distribution (woody) er dette problem rettet i følgende versioner og arkitekturer:

pakke arkitektur version
kernel-source-2.2.20 source 2.2.20-5woody3
kernel-image-2.2.20-i386 i386 2.2.20-5woody5
kernel-image-2.2.20-reiserfs-i386 i386 2.2.20-4woody1
kernel-image-2.2.20-amiga m68k 2.20-4
kernel-image-2.2.20-atari m68k 2.2.20-3
kernel-image-2.2.20-bvme6000 m68k 2.2.20-3
kernel-image-2.2.20-mac m68k 2.2.20-3
kernel-image-2.2.20-mvme147 m68k 2.2.20-3
kernel-image-2.2.20-mvme16x m68k 2.2.20-3
kernel-patch-2.2.20-powerpc powerpc 2.2.20-3woody1

I den ustabile distribution (sid) vil dette problem snart blive rettet hvad angår de arkitekturer som stadig leveres med en 2.2.x-kernepakke.

Vi anbefaler at du opgraderer din Linux kernepakke.

Sårbarhedsmatrix for CAN-2004-0077.

Rettet i:

Debian GNU/Linux 3.0 (woody)

Kildekode:
http://security.debian.org/pool/updates/main/k/kernel-source-2.2.20/kernel-source-2.2.20_2.2.20-5woody3.dsc
http://security.debian.org/pool/updates/main/k/kernel-source-2.2.20/kernel-source-2.2.20_2.2.20-5woody3.diff.gz
http://security.debian.org/pool/updates/main/k/kernel-source-2.2.20/kernel-source-2.2.20_2.2.20.orig.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-i386/kernel-image-2.2.20-i386_2.2.20-5woody5.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-i386/kernel-image-2.2.20-i386_2.2.20-5woody5.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-reiserfs-i386/kernel-image-2.2.20-reiserfs-i386_2.2.20-4woody1.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-reiserfs-i386/kernel-image-2.2.20-reiserfs-i386_2.2.20-4woody1.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-amiga/kernel-image-2.2.20-amiga_2.2.20-4.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-amiga/kernel-image-2.2.20-amiga_2.2.20-4.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-atari/kernel-image-2.2.20-atari_2.2.20-3.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-atari/kernel-image-2.2.20-atari_2.2.20-3.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-bvme6000/kernel-image-2.2.20-bvme6000_2.2.20-3.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-bvme6000/kernel-image-2.2.20-bvme6000_2.2.20-3.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-mac/kernel-image-2.2.20-mac_2.2.20-3.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-mac/kernel-image-2.2.20-mac_2.2.20-3.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-mvme147/kernel-image-2.2.20-mvme147_2.2.20-3.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-mvme147/kernel-image-2.2.20-mvme147_2.2.20-3.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-mvme16x/kernel-image-2.2.20-mvme16x_2.2.20-3.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-mvme16x/kernel-image-2.2.20-mvme16x_2.2.20-3.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-patch-2.2.20-powerpc/kernel-patch-2.2.20-powerpc_2.2.20-3woody1.dsc
http://security.debian.org/pool/updates/main/k/kernel-patch-2.2.20-powerpc/kernel-patch-2.2.20-powerpc_2.2.20-3woody1.tar.gz
Arkitekturuafhængig komponent:
http://security.debian.org/pool/updates/main/k/kernel-source-2.2.20/kernel-doc-2.2.20_2.2.20-5woody3_all.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.2.20/kernel-source-2.2.20_2.2.20-5woody3_all.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.2.20-powerpc/kernel-patch-2.2.20-powerpc_2.2.20-3woody1_all.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-i386/kernel-headers-2.2.20_2.2.20-5woody5_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-i386/kernel-headers-2.2.20-compact_2.2.20-5woody5_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-i386/kernel-headers-2.2.20-idepci_2.2.20-5woody5_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-i386/kernel-image-2.2.20_2.2.20-5woody5_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-i386/kernel-image-2.2.20-compact_2.2.20-5woody5_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-i386/kernel-image-2.2.20-idepci_2.2.20-5woody5_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-reiserfs-i386/kernel-headers-2.2.20-reiserfs_2.2.20-4woody1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-reiserfs-i386/kernel-image-2.2.20-reiserfs_2.2.20-4woody1_i386.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-amiga/kernel-image-2.2.20-amiga_2.2.20-4_m68k.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-atari/kernel-image-2.2.20-atari_2.2.20-3_m68k.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-bvme6000/kernel-image-2.2.20-bvme6000_2.2.20-3_m68k.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-mac/kernel-image-2.2.20-mac_2.2.20-3_m68k.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-mvme147/kernel-image-2.2.20-mvme147_2.2.20-3_m68k.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.2.20-mvme16x/kernel-image-2.2.20-mvme16x_2.2.20-3_m68k.deb
PowerPC:
http://security.debian.org/pool/updates/main/k/kernel-patch-2.2.20-powerpc/kernel-headers-2.2.20_2.2.20-3woody1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.2.20-powerpc/kernel-image-2.2.20-chrp_2.2.20-3woody1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.2.20-powerpc/kernel-image-2.2.20-pmac_2.2.20-3woody1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.2.20-powerpc/kernel-image-2.2.20-prep_2.2.20-3woody1_powerpc.deb

MD5-kontrolsummer for de listede filer findes i den originale sikkerhedsbulletin.