CVE-2004-0077

NameCVE-2004-0077
DescriptionThe do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to 2.4.24, and 2.6 to 2.6.2, does not properly check the return value from the do_munmap function when the maximum number of VMA descriptors is exceeded, which allows local users to gain root privileges, a different vulnerability than CAN-2003-0985.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-438, DSA-439, DSA-440, DSA-441, DSA-442, DSA-444, DSA-450, DSA-453, DSA-454, DSA-456, DSA-466, DSA-470, DSA-475, DSA-514
NVD severityhigh (attack range: local)

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kernel-image-2.2.10-powerpc-apussourcewoody2.2.10-13woody1highDSA-466
kernel-image-2.2.19-netwindersourcewoody20040303highDSA-456
kernel-image-2.2.19-riscpcsourcewoody20040303highDSA-456
kernel-image-2.2.20-amigasourcewoody2.20-4highDSA-453
kernel-image-2.2.20-atarisourcewoody2.2.20-3highDSA-453
kernel-image-2.2.20-bvme6000sourcewoody2.2.20-3highDSA-453
kernel-image-2.2.20-i386sourcewoody2.2.20-5woody5highDSA-453
kernel-image-2.2.20-macsourcewoody2.2.20-3highDSA-453
kernel-image-2.2.20-mvme147sourcewoody2.2.20-3highDSA-453
kernel-image-2.2.20-mvme16xsourcewoody2.2.20-3highDSA-453
kernel-image-2.2.20-reiserfs-i386sourcewoody2.2.20-4woody1highDSA-453
kernel-image-2.2.22-alphasourcewoody2.2.22-2highDSA-454
kernel-image-2.4.16-lartsourcewoody2.4.16-20040204highDSA-439
kernel-image-2.4.16-netwindersourcewoody2.4.16-20040204highDSA-439
kernel-image-2.4.16-riscpcsourcewoody2.4.16-20040204highDSA-439
kernel-image-2.4.17-hppasourcewoody32.3highDSA-470
kernel-image-2.4.17-ia64sourcewoody011226.16highDSA-444
kernel-image-2.4.17-s390sourcewoody2.4.17-2.woody.3highDSA-442
kernel-image-2.4.18-1-alphasourcewoody2.4.18-14highDSA-438
kernel-image-2.4.18-1-i386sourcewoody2.4.18-12.2highDSA-438
kernel-image-2.4.18-hppasourcewoody62.1highDSA-475
kernel-image-2.4.18-i386bfsourcewoody2.4.18-5woody7highDSA-438
kernel-patch-2.2.19-armsourcewoody20040303highDSA-456
kernel-patch-2.2.20-powerpcsourcewoody2.2.20-3woody1highDSA-453
kernel-patch-2.4.16-armsourcewoody20040204highDSA-439
kernel-patch-2.4.17-apussourcewoody2.4.17-4highDSA-440
kernel-patch-2.4.17-mipssourcewoody2.4.17-0.020226.2.woody5highDSA-441
kernel-patch-2.4.17-s390sourcewoody0.0.20020816-0.woody.2highDSA-442
kernel-patch-2.4.18-powerpcsourcewoody2.4.18-1woody4highDSA-438
kernel-patch-2.4.19-mipssourcewoody2.4.19-4.woody1highDSA-450
kernel-source-2.2.10sourcewoody2.2.10-2highDSA-466
kernel-source-2.2.19sourcewoody2.2.19.1-4woody1highDSA-456
kernel-source-2.2.20source(unstable)(unfixed)high
kernel-source-2.2.20sourcewoody2.2.20-5woody3highDSA-514
kernel-source-2.2.22sourcewoody2.2.22-1woody1highDSA-454
kernel-source-2.4.17sourcewoody2.4.17-4highDSA-440
kernel-source-2.4.18sourcewoody2.4.18-14.2highDSA-438
kernel-source-2.4.19sourcewoody2.4.19-0.020911.1.woody3highDSA-450
kernel-source-2.4.27source(unstable)(not affected)

Notes

- kernel-source-2.4.27 <not-affected> (Fixed before initial upload; 2.4.26-pre3)

Search for package or bug name: Reporting problems