Family: SuSE Local Security Checks --> Category: infos
SuSE-SA:2004:001: Linux Kernel Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the Linux Kernel package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory SuSE-SA:2004:001 (Linux Kernel).
The do_mremap() function of the Linux Kernel is used to manage
(move, resize) Virtual Memory Areas (VMAs). By exploiting an incorrect
bounds check in do_mremap() during the remapping of memory it is
possible to create a VMA with the size of 0.
In normal operation do_mremap() leaves a memory hole of one page and
creates an additional VMA of two pages. In case of exploitation no
hole is created but the new VMA has a 0 bytes length.
The Linux Kernel's memory management is corrupted from this point
and can be abused by local users to gain root rights.
There is no temporary workaround for this bug.
Please note that on 8.1, the kernel-source package may not be
installable through rpm, because of a bug in RPM (update of
the kernel source RPM may take 30 minutes or more, or fail
entirely). Owing to this problem, the kernel source is not
available as a regular YOU update.
However, recognizing our obligation to publish the source along
with the binary packages, we are making the source available as
a compressed tar archive, downloadable from the normal FTP
Solution : http://www.suse.de/security/2004_01_linux_kernel.html
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.