Rapid7 Vulnerability & Exploit Database

CESA-2003:416: kernel security update

Back to Search

CESA-2003:416: kernel security update

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
01/20/2004
Created
07/25/2018
Added
03/12/2010
Modified
07/04/2017

Description

Updated kernel packages are now available that fix a security vulnerability which may allow local users to gain root privileges.

The Linux kernel handles the basic functions of the operating system. Paul Starzetz discovered a flaw in bounds checking in mremap() in the Linux kernel versions 2.4.23 and previous which may allow a local attacker to gain root privileges. No exploit is currently available; however, it is believed that this issue is exploitable (although not trivially.) The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0985 to this issue. All users of CentOS Linux 3 are advised to upgrade to these errata packages, which contain a backported security patch that corrects this issue. CentOS would like to thank Paul Starzetz from ISEC for disclosing this issue as well as Andrea Arcangeli and Solar Designer for working on the patch.

Solution(s)

  • centos-upgrade-kernel
  • centos-upgrade-kernel-boot
  • centos-upgrade-kernel-doc
  • centos-upgrade-kernel-hugemem
  • centos-upgrade-kernel-hugemem-unsupported
  • centos-upgrade-kernel-smp
  • centos-upgrade-kernel-smp-unsupported
  • centos-upgrade-kernel-source
  • centos-upgrade-kernel-unsupported

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;