AUSCERT External Security Bulletin Redistribution

            ESB-2003.0247 -- Debian Security Advisory DSA 276-1
          New Linux kernel packages (s390) fix local root exploit
                               04 April 2003


        AusCERT Security Bulletin Summary

Product:                kernel
Vendor:                 Debian
Operating System:       Debian GNU/Linux 3.0
Platform:               IBM S/390
Impact:                 Root Compromise
Access Required:        Existing Account
CVE Names:              CAN-2003-0127

Ref:                    ESB-2003.0181

- --------------------------BEGIN INCLUDED TEXT--------------------

Hash: SHA1

- - --------------------------------------------------------------------------
Debian Security Advisory DSA 276-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
April 3rd, 2003                         http://www.debian.org/security/faq
- - --------------------------------------------------------------------------

Packages       : kernel-patch-2.4.17-s390, kernel-image-2.4.17-s390
Vulnerability  : local privilege escalation
Problem-Type   : local
Debian-specific: no
CVE Id         : CAN-2003-0127

The kernel module loader in Linux 2.2 and Linux 2.4 kernels has a flaw
in ptrace.  This hole allows local users to obtain root privileges by
using ptrace to attach to a child process that is spawned by the
kernel.  Remote exploitation of this hole is not possible.

This advisory only covers kernel packages for the S/390 architecture.
Other architectures will be covered by separate advisories.

For the stable distribution (woody) this problem has been fixed in the
following versions:
  kernel-patch-2.4.17-s390: version 0.0.20020816-0.woody.1.1
  kernel-image-2.4.17-s390: version 2.4.17-2.woody.2.2

The old stable distribution (potato) is not affected by this problem
for this architecture since s390 was first released with Debian
GNU/Linux 3.0 (woody).

For the unstable distribution (sid) this problem will be fixed soon.

We recommend that you upgrade your kernel-images packages immediately.

Upgrade Instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- - --------------------------------

  Source archives:

      Size/MD5 checksum:      793 797d475344401f5fb9ad14deb88cd9eb
      Size/MD5 checksum:     6640 0fa8c3bc6c33d5fe47200e2e78c895fb
      Size/MD5 checksum:   338001 5979fbe7c3325033536dfd3914e22dbd

      Size/MD5 checksum:      766 4ed91ba4468490b1f000f2f50fefcfcd
      Size/MD5 checksum:     7041 aa4841ee18ad551085aac60b2afd156f

  Architecture independent components:

      Size/MD5 checksum:   301464 691bc1a529cb6125bb04ca43d795c139

  IBM S/390 architecture:

      Size/MD5 checksum:  3316464 5e748d0b8376f80bcbc6f1fea8d73b64
      Size/MD5 checksum:  1339368 fa1ff23854a5ae570efec050bc42eb13

  These files will probably be moved into the stable distribution on
  its next revision.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

Version: GnuPG v1.2.1 (GNU/Linux)


- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content.  The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:


If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business 
                hours which are GMT+10:00 (AEST).  On call after hours 
                for member emergencies only.

Version: 2.6.3i
Charset: noconv
Comment: http://www.auscert.org.au/render.html?it=1967