Debian Security Advisory

kernel -- bug in capabilities handling allows root exploits

Date Reported:
12 Jun 2000
Affected Packages:
kernel-image, kernel-source
Vulnerable:
No
Security database references:
No other external database security references currently available.
More information:
There is a widely-reported problem with the handling of POSIX capabilities in the Linux kernel that can lead to root compromise in setuid applications. This bug does not affect kernels in the 2.0 or earlier series; the 2.0 kernels installed by default in Debian GNU/Linux 2.1 (slink) are not vulnerable. If you are running a kernel with a version of 2.1.*, 2.2.*, or 2.3.*, you should upgrade immediately.

The Debian kernel source package currently in potato, kernel-source-2.2.15-3, and binaries built from it, such as kernel-image-2.2.15-2 (or more recent versions), are patched to prevent this vulnerability. If you prefer to download kernel source from a mirror of ftp.kernel.org instead of using the debian package, you should download 2.2.16 or better.