A serious vulnerability in the Linux 2.4 kernel that allows users on a Linux machine to gain unlimited access privileges has been discovered, according to a security advisory posted by developers of the non-commercial Debian Linux distribution.
The bug affects versions of the Linux kernel prior to 2.4.23, and was the method used during a recent attack on Debian's servers, the advisory said.
In that attack four Linux servers that hosted Debian's bug tracking system, mailing lists and various Web pages were compromised.
The vulnerability could only be exploited by somebody who has already been given a user account on the Linux machine, and did not affect users of every Linux system, Linux creator, Linus Torvalds, said.
"It's a local-only compromise that you can't trigger from the outside," he said. "To most people, it would thus become serious only after you had some account hacked into - the bug then allows elevation of privileges."
The bug does not only affect Debian users, however. Any Linux user running a version of the kernel prior to 2.4.23 should contact their distribution provider to see whether a patch for the exploit had been made available, Torvalds said.
The problem was discovered by Linux kernel developer, Andrew Morton, in September, and was fixed in the 2.4.23 version of the kernel, but Linux distributors had been working to coordinate a release of a fix for the problem, said Dave Wreski, chief executive officer with Guardian Digital, the vendor of a secure Linux distribution.
"What all the hoopla is about is that Debian somehow let this patch that's been available for a month or two slip and got bitten by it," Wreski said.
This week, patches that corrected the kernel bug had been issued for a number of Linux distributions, including Red Hat, Debian, and Mandrake Linux.