Linux Kernel多个设备驱动漏洞

漏洞信息详情

Linux Kernel多个设备驱动漏洞

漏洞简介

Linux是一款开放源代码操作系统。
Linux内核多个设备驱动存在问题,本地攻击者可以利用这些漏洞进行权限提升或对系统进行拒绝服务攻击。
这些受影响的设备驱动为:aironet、asus_acpi、decnet、mpu401、msnd和pss,这些问题允许攻击者访问内核内存获得敏感信息或权限提升。

漏洞公告

厂商补丁:
RedHat
——
RedHat已经为此发布了一个安全公告(RHSA-2004:255-10)以及相应补丁:

RHSA-2004:255-10:Updated kernel packages fix security vulnerabilities

链接:https://www.redhat.com/support/errata/RHSA-2004-255.html” target=”_blank”>https://www.redhat.com/support/errata/RHSA-2004-255.html

补丁下载:

Red Hat Desktop (v. 3)

——————————————————————————–

AMD64:

kernel-2.4.21-15.0.2.EL.x86_64.rpm 13aabc1c96dfee65f73246051a955ba8

kernel-doc-2.4.21-15.0.2.EL.x86_64.rpm 608d072210521af17c455f7754a6e352

kernel-smp-2.4.21-15.0.2.EL.x86_64.rpm 82154d7551d6e4947af70b3044c9d4d2

kernel-smp-unsupported-2.4.21-15.0.2.EL.x86_64.rpm 8fde60be45154b7722893feb65506f42

kernel-source-2.4.21-15.0.2.EL.x86_64.rpm 44be30f820be806621b47786ebff1844

kernel-unsupported-2.4.21-15.0.2.EL.x86_64.rpm aa060423c3136a26ca31a7aafa337380

EM64T:

kernel-2.4.21-15.0.2.EL.ia32e.rpm 90dabcf0bb591756e5f04f397cf8a156

kernel-unsupported-2.4.21-15.0.2.EL.ia32e.rpm 144943d76b23470572326c84b57c0dd9

SRPMS:

kernel-2.4.21-15.0.2.EL.src.rpm 669d77609b1c47ff49c939c1ea7bbc45

athlon:

kernel-2.4.21-15.0.2.EL.athlon.rpm 05b0bcb454ac5454479481d0288fbf20

kernel-smp-2.4.21-15.0.2.EL.athlon.rpm 96eb477ac938da01b729b5ac5ed36e3b

kernel-smp-unsupported-2.4.21-15.0.2.EL.athlon.rpm 9d24273cc70bb6be810984cb3f3d0a36

kernel-unsupported-2.4.21-15.0.2.EL.athlon.rpm 17f10f04cffc9751afb1499aaff00fdc

i386:

kernel-BOOT-2.4.21-15.0.2.EL.i386.rpm 4635f8c6555f3b3e52feb9444b2e230d

kernel-doc-2.4.21-15.0.2.EL.i386.rpm 6cf6c39a83dfe7cca9c9a79f02dc3fa8

kernel-source-2.4.21-15.0.2.EL.i386.rpm 3c690c54909996d3bba3da7c8d8f894a

i686:

kernel-2.4.21-15.0.2.EL.i686.rpm a3073219b60cbb7ce447a22e5103e097

kernel-hugemem-2.4.21-15.0.2.EL.i686.rpm 6c8dad84abc4dd1892c9dc862c329273

kernel-hugemem-unsupported-2.4.21-15.0.2.EL.i686.rpm 426c517d35a53546138b0d72a0515909

kernel-smp-2.4.21-15.0.2.EL.i686.rpm bece09ba4a651196758380372dc4c593

kernel-smp-unsupported-2.4.21-15.0.2.EL.i686.rpm 775338e099c3bdf36a586d29e55dbd3e

kernel-unsupported-2.4.21-15.0.2.EL.i686.rpm 89ee51cb60f7a1f34e66cbb16abcba07

Red Hat Enterprise Linux AS (v. 3)

——————————————————————————–

AMD64:

kernel-2.4.21-15.0.2.EL.x86_64.rpm 13aabc1c96dfee65f73246051a955ba8

kernel-doc-2.4.21-15.0.2.EL.x86_64.rpm 608d072210521af17c455f7754a6e352

kernel-smp-2.4.21-15.0.2.EL.x86_64.rpm 82154d7551d6e4947af70b3044c9d4d2

kernel-smp-unsupported-2.4.21-15.0.2.EL.x86_64.rpm 8fde60be45154b7722893feb65506f42

kernel-source-2.4.21-15.0.2.EL.x86_64.rpm 44be30f820be806621b47786ebff1844

kernel-unsupported-2.4.21-15.0.2.EL.x86_64.rpm aa060423c3136a26ca31a7aafa337380

EM64T:

kernel-2.4.21-15.0.2.EL.ia32e.rpm 90dabcf0bb591756e5f04f397cf8a156

kernel-unsupported-2.4.21-15.0.2.EL.ia32e.rpm 144943d76b23470572326c84b57c0dd9

SRPMS:

kernel-2.4.21-15.0.2.EL.src.rpm 669d77609b1c47ff49c939c1ea7bbc45

athlon:

kernel-2.4.21-15.0.2.EL.athlon.rpm 05b0bcb454ac5454479481d0288fbf20

kernel-smp-2.4.21-15.0.2.EL.athlon.rpm 96eb477ac938da01b729b5ac5ed36e3b

kernel-smp-unsupported-2.4.21-15.0.2.EL.athlon.rpm 9d24273cc70bb6be810984cb3f3d0a36

kernel-unsupported-2.4.21-15.0.2.EL.athlon.rpm 17f10f04cffc9751afb1499aaff00fdc

i386:

kernel-BOOT-2.4.21-15.0.2.EL.i386.rpm 4635f8c6555f3b3e52feb9444b2e230d

kernel-doc-2.4.21-15.0.2.EL.i386.rpm 6cf6c39a83dfe7cca9c9a79f02dc3fa8

kernel-source-2.4.21-15.0.2.EL.i386.rpm 3c690c54909996d3bba3da7c8d8f894a

i686:

kernel-2.4.21-15.0.2.EL.i686.rpm a3073219b60cbb7ce447a22e5103e097

kernel-hugemem-2.4.21-15.0.2.EL.i686.rpm 6c8dad84abc4dd1892c9dc862c329273

kernel-hugemem-unsupported-2.4.21-15.0.2.EL.i686.rpm 426c517d35a53546138b0d72a0515909

kernel-smp-2.4.21-15.0.2.EL.i686.rpm bece09ba4a651196758380372dc4c593

kernel-smp-unsupported-2.4.21-15.0.2.EL.i686.rpm 775338e099c3bdf36a586d29e55dbd3e

kernel-unsupported-2.4.21-15.0.2.EL.i686.rpm 89ee51cb60f7a1f34e66cbb16abcba07

ia64:

kernel-2.4.21-15.0.2.EL.ia64.rpm 24ddfb9f957028d3bbc5cfff2b25bc67

kernel-doc-2.4.21-15.0.2.EL.ia64.rpm cc60f06bdd3ad6a05040df8ba40d41a1

kernel-source-2.4.21-15.0.2.EL.ia64.rpm a8fc2a1042ee3e580881b50c97a3241d

kernel-unsupported-2.4.21-15.0.2.EL.ia64.rpm 60e5c1f1efa438a658b12e16543214cd

ppc64:

kernel-doc-2.4.21-15.0.2.EL.ppc64.rpm 3f21dd578af78ed576c7cbf6e17a3f16

kernel-source-2.4.21-15.0.2.EL.ppc64.rpm 937a05a7666f14f95d20be19fc461f05

ppc64iseries:

kernel-2.4.21-15.0.2.EL.ppc64iseries.rpm 495a1c8f85e0e237643fd2e3f89ddaed

kernel-unsupported-2.4.21-15.0.2.EL.ppc64iseries.rpm 57f0111e6443fd5a39099731cc0856e8

ppc64pseries:

kernel-2.4.21-15.0.2.EL.ppc64pseries.rpm 6ad188ae0c61a077dede364c59448f61

kernel-unsupported-2.4.21-15.0.2.EL.ppc64pseries.rpm 22f38c0c1abee45e0ac24caa19e06311

s390:

kernel-2.4.21-15.0.2.EL.s390.rpm 1b9d329e2b074616239a91fd967871c8

kernel-doc-2.4.21-15.0.2.EL.s390.rpm 5e27cc65020dbb1c92368e79c3edcbe6

kernel-source-2.4.21-15.0.2.EL.s390.rpm 282bb4f0e5bfbec228a742ab6666665d

kernel-unsupported-2.4.21-15.0.2.EL.s390.rpm 8f67e244ba867a103e6b211d3d0d1fba

s390x:

kernel-2.4.21-15.0.2.EL.s390x.rpm a8bab06e561ac8b6ab473b4e722a570b

kernel-doc-2.4.21-15.0.2.EL.s390x.rpm 860944b6a4e8384a0b344dc96ea48b6d

kernel-source-2.4.21-15.0.2.EL.s390x.rpm 6e9628389fa69aafc9c910e4b37a425a

kernel-unsupported-2.4.21-15.0.2.EL.s390x.rpm 3522c33c18eb876b5033ef12398707fe

Red Hat Enterprise Linux ES (v. 3)

——————————————————————————–

AMD64:

kernel-2.4.21-15.0.2.EL.x86_64.rpm 13aabc1c96dfee65f73246051a955ba8

kernel-doc-2.4.21-15.0.2.EL.x86_64.rpm 608d072210521af17c455f7754a6e352

kernel-smp-2.4.21-15.0.2.EL.x86_64.rpm 82154d7551d6e4947af70b3044c9d4d2

kernel-smp-unsupported-2.4.21-15.0.2.EL.x86_64.rpm 8fde60be45154b7722893feb65506f42

kernel-source-2.4.21-15.0.2.EL.x86_64.rpm 44be30f820be806621b47786ebff1844

kernel-unsupported-2.4.21-15.0.2.EL.x86_64.rpm aa060423c3136a26ca31a7aafa337380

EM64T:

kernel-2.4.21-15.0.2.EL.ia32e.rpm 90dabcf0bb591756e5f04f397cf8a156

kernel-unsupported-2.4.21-15.0.2.EL.ia32e.rpm 144943d76b23470572326c84b57c0dd9

SRPMS:

kernel-2.4.21-15.0.2.EL.src.rpm

参考网址

来源:US-CERT Vulnerability Note: VU#973654
名称: VU#973654
链接:http://www.kb.cert.org/vuls/id/973654

来源: XF
名称: linux-dos(16412)
链接:http://xforce.iss.net/xforce/xfdb/16412

来源: TRUSTIX
名称: 2004-0034
链接:http://www.trustix.net/errata/2004/0034/

来源: REDHAT
名称: RHSA-2004:260
链接:http://www.redhat.com/support/errata/RHSA-2004-260.html

来源: REDHAT
名称: RHSA-2004:255
链接:http://www.redhat.com/support/errata/RHSA-2004-255.html

来源: SUSE
名称: SuSE-SA:2004:017
链接:http://www.novell.com/linux/security/advisories/2004_17_kernel.html

来源: GENTOO
名称: GLSA-200407-02
链接:http://security.gentoo.org/glsa/glsa-200407-02.xml

来源: OVAL
名称: oval:org.mitre.oval:def:9426
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9426

来源: MLIST
名称: [linux-kernel] 20040609 timer + fpu stuff locks my console race
链接:http://marc.theaimsgroup.com/?l=linux-kernel&m=108681568931323&w=2

来源: ENGARDE
名称: ESA-20040621-005
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=108793699910896&w=2

来源: FEDORA
名称: FEDORA-2004-186
链接:http://lwn.net/Articles/91155/

来源: linuxreviews.org
链接:http://linuxreviews.org/news/2004-06-11_kernel_crash/index.html

来源: gcc.gnu.org
链接:http://gcc.gnu.org/bugzilla/show_bug.cgi?id=15905

来源: CONECTIVA
名称: CLA-2004:845
链接:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000845

来源: BID
名称: 10538
链接:http://www.securityfocus.com/bid/10538

来源: MANDRAKE
名称: MDKSA-2004:062
链接:http://www.mandriva.com/security/advisories?name=MDKSA-2004:062

来源: DEBIAN
名称: DSA-1082
链接:http://www.debian.org/security/2006/dsa-1082

来源: DEBIAN
名称: DSA-1070
链接:http://www.debian.org/security/2006/dsa-1070

来源: DEBIAN
名称: DSA-1069
链接:http://www.debian.org/security/2006/dsa-1069

来源: DEBIAN
名称: DSA-1067
链接:http://www.debian.org/security/2006/dsa-1067

来源: SECUNIA
名称: 20338
链接:http://secunia.com/advisories/20338

来源: SECUNIA
名称: 20202
链接:http://secunia.com/advisories/20202

来源: SECUNIA
名称: 20163
链接:http://secunia.com/advisories/20163

来源: SECUNIA
名称: 20162
链接:http://secunia.com/advisories/20162

来源: BUGTRAQ
名称: 20040620 TSSA-2004-011 – kernel
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=108786114032681&w=2

来源: US Government Resource: oval:org.mitre.oval:def:2915
名称: oval:org.mitre.oval:def:2915
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:2915

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享