CVE-2004-0077

NameCVE-2004-0077
DescriptionThe do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to 2.4.24, and 2.6 to 2.6.2, does not properly check the return value from the do_munmap function when the maximum number of VMA descriptors is exceeded, which allows local users to gain root privileges, a different vulnerability than CAN-2003-0985.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-438, DSA-439, DSA-440, DSA-441, DSA-442, DSA-444, DSA-450, DSA-453, DSA-454, DSA-456, DSA-466, DSA-470, DSA-475, DSA-514
NVD severityhigh

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kernel-image-2.2.10-powerpc-apussourcewoody2.2.10-13woody1DSA-466
kernel-image-2.2.19-netwindersourcewoody20040303DSA-456
kernel-image-2.2.19-riscpcsourcewoody20040303DSA-456
kernel-image-2.2.20-amigasourcewoody2.20-4DSA-453
kernel-image-2.2.20-atarisourcewoody2.2.20-3DSA-453
kernel-image-2.2.20-bvme6000sourcewoody2.2.20-3DSA-453
kernel-image-2.2.20-i386sourcewoody2.2.20-5woody5DSA-453
kernel-image-2.2.20-macsourcewoody2.2.20-3DSA-453
kernel-image-2.2.20-mvme147sourcewoody2.2.20-3DSA-453
kernel-image-2.2.20-mvme16xsourcewoody2.2.20-3DSA-453
kernel-image-2.2.20-reiserfs-i386sourcewoody2.2.20-4woody1DSA-453
kernel-image-2.2.22-alphasourcewoody2.2.22-2DSA-454
kernel-image-2.4.16-lartsourcewoody2.4.16-20040204DSA-439
kernel-image-2.4.16-netwindersourcewoody2.4.16-20040204DSA-439
kernel-image-2.4.16-riscpcsourcewoody2.4.16-20040204DSA-439
kernel-image-2.4.17-hppasourcewoody32.3DSA-470
kernel-image-2.4.17-ia64sourcewoody011226.16DSA-444
kernel-image-2.4.17-s390sourcewoody2.4.17-2.woody.3DSA-442
kernel-image-2.4.18-1-alphasourcewoody2.4.18-14DSA-438
kernel-image-2.4.18-1-i386sourcewoody2.4.18-12.2DSA-438
kernel-image-2.4.18-hppasourcewoody62.1DSA-475
kernel-image-2.4.18-i386bfsourcewoody2.4.18-5woody7DSA-438
kernel-patch-2.2.19-armsourcewoody20040303DSA-456
kernel-patch-2.2.20-powerpcsourcewoody2.2.20-3woody1DSA-453
kernel-patch-2.4.16-armsourcewoody20040204DSA-439
kernel-patch-2.4.17-apussourcewoody2.4.17-4DSA-440
kernel-patch-2.4.17-mipssourcewoody2.4.17-0.020226.2.woody5DSA-441
kernel-patch-2.4.17-s390sourcewoody0.0.20020816-0.woody.2DSA-442
kernel-patch-2.4.18-powerpcsourcewoody2.4.18-1woody4DSA-438
kernel-patch-2.4.19-mipssourcewoody2.4.19-4.woody1DSA-450
kernel-source-2.2.10sourcewoody2.2.10-2DSA-466
kernel-source-2.2.19sourcewoody2.2.19.1-4woody1DSA-456
kernel-source-2.2.20source(unstable)(unfixed)
kernel-source-2.2.20sourcewoody2.2.20-5woody3DSA-514
kernel-source-2.2.22sourcewoody2.2.22-1woody1DSA-454
kernel-source-2.4.17sourcewoody2.4.17-4DSA-440
kernel-source-2.4.18sourcewoody2.4.18-14.2DSA-438
kernel-source-2.4.19sourcewoody2.4.19-0.020911.1.woody3DSA-450
kernel-source-2.4.27source(unstable)(not affected)

Notes

- kernel-source-2.4.27 <not-affected> (Fixed before initial upload; 2.4.26-pre3)

Search for package or bug name: Reporting problems