Guardian Digital Inc. Information for VU#490620

Linux kernel do_mremap() call creates virtual memory area of 0 bytes in length



Vendor Statement

Hash: SHA1

| Guardian Digital Security Advisory January 05, 2003 |
| ESA-20040105-001 |
| |
| Package: kernel |
| Summary: bug and security fixes. |

EnGarde Secure Linux is an enterprise class Linux platform engineered
to enable corporations to quickly and cost-effectively build a complete
and secure Internet presence while preventing Internet threats.

- --------
This update fixes two security issues and one critical bug in the Linux
Kernel shipped with EnGarde Secure Linux.

A summary of the bugs fixed:

* An EnGarde-specific memory leak in the LIDS code has been fixed.
This memory leak could cause a machine, over time, to freeze up.

* A security vulnerability in the mremap(2) system call was recently
discovered by Paul Starzetz. The incorrect bounds checking done
in this system call could be exploited by a local user to gain root

The Common Vulnerabilities and Exposures project ( has
assigned the name CAN-2003-0985 to this issue.

* A somewhat less critical vulnerability has been found in the Linux
RTC code. This vulnerability may leak small bits of arbitrary
kernel memory to user land.

The Common Vulnerabilities and Exposures project ( has
assigned the name CAN-2003-0984 to this issue.

Guardian Digital products affected by this issue include:

EnGarde Secure Community 2
EnGarde Secure Professional v1.5

It is recommended that all users apply this update as soon as possible.

- --------
Guardian Digital Secure Network subscribers may automatically update
affected systems by accessing their account from within the Guardian
Digital WebTool.

To modify your GDSN account and contact preferences, please go to:

- ----------
Guardian Digital's public key:

Official Web Site of the Linux Kernel:

Guardian Digital Advisories:

Security Contact:

- --------------------------------------------------------------------------
Author: Ryan W. Maple <>
Copyright 2004, Guardian Digital, Inc.

Version: GnuPG v1.2.2 (GNU/Linux)


Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References



The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.