Linux Kernel: Multiple vulnerabilities Multiple vulnerabilities have been found in the Linux kernel used by GNU/Linux systems. Patched, or updated versions of these kernels have been released and details are included in this advisory. Kernel July 03, 2004 March 27, 2011: 04 47881 49637 53804 54976 55698 local 2.4.23-r2 2.4.23-r2 2.4.21-r8 2.4.21-r8 2.4.26-r1 2.6.7-r1 2.6.7-r1 2.4.9.32.7-r7 2.4.9.32.7-r7 2.6.7 2.6.7 2.4.20-r14 2.4.20-r14 2.6.7 2.6.7 2.4.19-r17 2.4.20-r20 2.4.22-r12 2.4.25-r5 2.4.26-r3 2.4.26-r3 2.4.26.2.0-r5 2.4.26.2.0-r5 2.4.25_pre7-r7 2.4.25_pre7-r7 2.6.7 2.6.7 2.4.26-r2 2.4.26-r2 2.6.7 2.6.7 2.4.26_p6 2.4.26_p6 2.4.24-r5 2.4.24-r5 2.4.26-r3 2.4.26-r3 2.6.7-r1 2.6.7-r1 2.4.22-r10 2.4.22-r10 2.4.23-r8 2.4.23-r8 2.6.7 2.6.7 2.4.26-r2 2.4.26-r2 2.4.21-r10 2.4.21-r10 2.4.26-r2 2.4.26-r2 2.6.7 2.6.7 2.4.26-r2 2.4.26-r2 2.6.7-r1 2.6.7-r1 2.4.26-r2 2.4.26-r2 2.4.26-r2 2.4.26-r2 2.4.26_p0-r2 2.4.26_p0-r2 2.4.24-r5 2.4.26-r2 2.4.26-r2 2.0 2.0 2.4 2.4.26.1.3.9-r2 2.4.26-r2 2.4.26-r2 4.9-r9 4.11-r6 4.14-r3 4.14-r3 2.6.7 2.6.7 2.4.24-r8 2.4.24-r8 2.4.27 2.4.26

The Linux kernel is responsible for managing the core aspects of a GNU/Linux system, providing an interface for core system applications as well as providing the essential structure and capability to access hardware that is needed for a running system.

Multiple flaws have been discovered in the Linux kernel. This advisory corrects the following issues:

Arbitrary code with normal non-super-user privileges may be able to exploit any of these vulnerabilities; gaining kernel level access to memory structures and hardware devices. This may be used for further exploitation of the system, to leak sensitive data or to cause a Denial of Service on the affected kernel.

Although users may not be affected by certain vulnerabilities, all kernels are affected by the CAN-2004-0394, CAN-2004-0427 and CAN-2004-0554 issues which have no workaround. As a result, all users are urged to upgrade their kernels to patched versions.

Users are encouraged to upgrade to the latest available sources for their system:

# emerge sync # emerge -pv your-favorite-sources # emerge your-favorite-sources # # Follow usual procedure for compiling and installing a kernel. # # If you use genkernel, run genkernel as you would do normally.
CVE-2004-0109 CVE-2004-0133 CVE-2004-0177 CVE-2004-0178 CVE-2004-0181 CVE-2004-0228 CVE-2004-0229 CVE-2004-0394 CVE-2004-0427 CVE-2004-0495 CVE-2004-0535 CVE-2004-0554 CVE-2004-1983 plasmaroo