漏洞信息详情
Linux O_DIRECT定向输入/输出信息泄露漏洞
- CNNVD编号:CNNVD-200302-037
- 危害等级: 低危
- CVE编号:
CVE-2003-0018
- 漏洞类型:
其他
- 发布时间:
2003-02-19
- 威胁类型:
本地
- 更新时间:
2005-05-13
- 厂 商:
linux - 漏洞来源:
Red Hat Security A… -
漏洞简介
Linux是开放内核源代码的操作系统。
某些Linux内核不正确处理O_DIRECT标记,任意拥有系统写权限的本地攻击者可以利用这个漏洞读取其他文件中受限信息。
Linux kernels 2.4.10及之后的版本在处理O_DIRECT标记上存在漏洞,可以使的任何对文件系统有写权限的用户读取部分文件信息(从以前删除过的文件中),及产生较小的文件系统破坏(可以方便的通过fsck修复)。REDHAT LINUX使用ext3文件系统不支持O_DIRECT功能,因此不存在此问题,但是RedHat发行的2.4.18版本却存在这个漏洞。
漏洞公告
厂商补丁:
MandrakeSoft
————
MandrakeSoft已经为此发布了一个安全公告(MDKSA-2003:014)以及相应补丁:
MDKSA-2003:014:Updated kernel packages fix a number of bugs
链接:http://www.linux-mandrake.com/en/security/2003/MDKSA-2003-014.php” target=”_blank”>
http://www.linux-mandrake.com/en/security/2003/MDKSA-2003-014.php
补丁下载:
Updated Packages:
Mandrake Linux 9.0:
上述升级软件还可以在下列地址中的任意一个镜像ftp服务器上下载:
http://www.mandrakesecure.net/en/ftp.php” target=”_blank”>
http://www.mandrakesecure.net/en/ftp.php
RedHat
——
RedHat已经为此发布了一个安全公告(RHSA-2003:025-20)以及相应补丁:
RHSA-2003:025-20:Updated 2.4 kernel fixes various vulnerabilities
链接:https://www.redhat.com/support/errata/RHSA-2003-025.html” target=”_blank”>https://www.redhat.com/support/errata/RHSA-2003-025.html
补丁下载:
Red Hat Linux 7.1:
SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/kernel-2.4.18-24.7.x.src.rpm
athlon:
ftp://updates.redhat.com/7.1/en/os/athlon/kernel-2.4.18-24.7.x.athlon.rpm
ftp://updates.redhat.com/7.1/en/os/athlon/kernel-smp-2.4.18-24.7.x.athlon.rpm
i386:
ftp://updates.redhat.com/7.1/en/os/i386/kernel-2.4.18-24.7.x.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/kernel-source-2.4.18-24.7.x.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/kernel-doc-2.4.18-24.7.x.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/kernel-BOOT-2.4.18-24.7.x.i386.rpm
i586:
ftp://updates.redhat.com/7.1/en/os/i586/kernel-2.4.18-24.7.x.i586.rpm
ftp://updates.redhat.com/7.1/en/os/i586/kernel-smp-2.4.18-24.7.x.i586.rpm
i686:
ftp://updates.redhat.com/7.1/en/os/i686/kernel-2.4.18-24.7.x.i686.rpm
ftp://updates.redhat.com/7.1/en/os/i686/kernel-smp-2.4.18-24.7.x.i686.rpm
ftp://updates.redhat.com/7.1/en/os/i686/kernel-bigmem-2.4.18-24.7.x.i686.rpm
ftp://updates.redhat.com/7.1/en/os/i686/kernel-debug-2.4.18-24.7.x.i686.rpm
Red Hat Linux 7.2:
SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/kernel-2.4.18-24.7.x.src.rpm
athlon:
ftp://updates.redhat.com/7.2/en/os/athlon/kernel-2.4.18-24.7.x.athlon.rpm
ftp://updates.redhat.com/7.2/en/os/athlon/kernel-smp-2.4.18-24.7.x.athlon.rpm
i386:
ftp://updates.redhat.com/7.2/en/os/i386/kernel-2.4.18-24.7.x.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/kernel-source-2.4.18-24.7.x.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/kernel-doc-2.4.18-24.7.x.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/kernel-BOOT-2.4.18-24.7.x.i386.rpm
i586:
ftp://updates.redhat.com/7.2/en/os/i586/kernel-2.4.18-24.7.x.i586.rpm
ftp://updates.redhat.com/7.2/en/os/i586/kernel-smp-2.4.18-24.7.x.i586.rpm
i686:
ftp://updates.redhat.com/7.2/en/os/i686/kernel-2.4.18-24.7.x.i686.rpm
ftp://updates.redhat.com/7.2/en/os/i686/kernel-smp-2.4.18-24.7.x.i686.rpm
ftp://updates.redhat.com/7.2/en/os/i686/kernel-bigmem-2.4.18-24.7.x.i686.rpm
ftp://updates.redhat.com/7.2/en/os/i686/kernel-debug-2.4.18-24.7.x.i686.rpm
Red Hat Linux 7.3:
SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/kernel-2.4.18-24.7.x.src.rpm
athlon:
ftp://updates.redhat.com/7.3/en/os/athlon/kernel-2.4.18-24.7.x.athlon.rpm
ftp://updates.redhat.com/7.3/en/os/athlon/kernel-smp-2.4.18-24.7.x.athlon.rpm
i386:
来源: REDHAT
名称: RHSA-2003:025
链接:http://www.redhat.com/support/errata/RHSA-2003-025.html
来源: DEBIAN
名称: DSA-423
链接:http://www.debian.org/security/2004/dsa-423
来源: XF
名称: linux-odirect-information-leak(11249)
链接:http://www.iss.net/security_center/static/11249.php
来源: BID
名称: 6763
链接:http://www.securityfocus.com/bid/6763
来源: MANDRAKE
名称: MDKSA-2003:014
链接:http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:014
来源: DEBIAN
名称: DSA-358
链接:http://www.debian.org/security/2003/dsa-358
来源: linux.bkbits.net:8080
链接:http://linux.bkbits.net:8080/linux-2.4/cset@3e2f193drGJDBg9SG6JwaDQwCBnAMQ