5181605 2000-06-10 10:07 /76 rader/ Postmaster Mottagare: Bugtraq (import) <11246> Ärende: CONECTIVA LINUX SECURITY ANNOUNCEMENT - kernel ------------------------------------------------------------ Approved-By: aleph1@SECURITYFOCUS.COM Delivered-To: bugtraq@lists.securityfocus.com Delivered-To: bugtraq@securityfocus.com Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Message-ID: <20000608201504.A16871@conectiva.com.br> Date: Thu, 8 Jun 2000 20:15:04 -0300 Reply-To: Sergio Bruder <bruder@CONECTIVA.COM.BR> Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM> From: Sergio Bruder <bruder@CONECTIVA.COM.BR> X-To: lwn@lwn.net, facosta@centroin.com.br, brain@matrix.com.br bos@sekure.org To: BUGTRAQ@SECURITYFOCUS.COM ---------------------------------------------------------------------- CONECTIVA LINUX SECURITY ANNOUNCEMENT ---------------------------------------------------------------------- PACKAGE: kernel-2.2.14 SUMMARY : Security problems with capabilities DATE : 2000-06-08 AFFECTED CONECTIVA VERSIONS : 4.0, 4.1, 4.2 and 5.0 DESCRIPTION The 2.2.x series of the linux kernel implement capabilities. Capabilites can be used to restrict what the root user can do. Many privileged programs, such as SUID programs, drop root privileges before taking certain action, such as executing an user supplied program. By constructing an environment where a certain capability is set, the loss of root privileges doesn't work and the privileged program keeps on taking its action, but as root, not as a normal user as it was intended to do. This can lead to root compromise. SOLUTION All users MUST upgrade the kernel immediately by downloading the appropriate package below. This release incorporates the fix used in the 2.2.16 version. This kernel vulnerability can be exploited in many ways. Some vendors have provided updated packages for their SUID programs, such as sendmail. By upgrading the kernel, these specific vendor updates are not necessary for this problem, unless they fix something else too that the user needs. Updates for versions 4.0, 4.1 and 4.2 will follow shortly. DIRECT DOWNLOAD LINKS TO UPDATED PACKAGES ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/5.0/i386/alsasound-2.2.14-19cl.i386.rpm ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/5.0/i386/kernel-2.2.14-19cl.i386.rpm ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/5.0/i386/kernel-BOOT-2.2.14-19cl.i386.rpm ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/5.0/i386/kernel-doc-2.2.14-19cl.i386.rpm ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/5.0/i386/kernel-headers-2.2.14-19cl.i386.rpm ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/5.0/i386/kernel-ibcs-2.2.14-19cl.i386.rpm ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/5.0/i386/kernel-install-2.2.14-19cl.i386.rpm ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/5.0/i386/kernel-pcmcia-cs-2.2.14-19cl.i386.rpm ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/5.0/i386/kernel-smp-2.2.14-19cl.i386.rpm ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/5.0/i386/kernel-source-2.2.14-19cl.i386.rpm ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/5.0/i386/sensors-2.2.14-19cl.i386.rpm ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/5.0/i386/sensors-devel-2.2.14-19cl.i386.rpm DIRECT LINK TO THE SOURCE PACKAGE ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/5.0/SRPMS/kernel-2.2.14-19cl.src.rpm ---------------------------------------------------------------------- All packages are signed with Conectiva's PGP key. The key can be obtained at http://www.conectiva.com.br/conectiva/contato.html ---------------------------------------------------------------------- subscribe: atualizacoes-anuncio-subscribe@bazar.conectiva.com.br unsubscribe: atualizacoes-anuncio-unsubscribe@bazar.conectiva.com.br (5181605) ------------------------------------------(Ombruten)