漏洞信息详情
Linux Kernel多个本地漏洞
- CNNVD编号:CNNVD-200412-067
- 危害等级: 低危
- CVE编号:
CVE-2004-1335
- 漏洞类型:
未知
- 发布时间:
2004-12-15
- 威胁类型:
本地
- 更新时间:
2005-10-20
- 厂 商:
linux - 漏洞来源:
Discovery of these… -
漏洞简介
Linux kernel 2.6.10以前的版本的ip_options_get函数存在内存泄漏漏洞,本地用户通过重复的调用ip_cmsg_send函数导致服务拒绝(内存消耗)。
漏洞公告
Reportedly, these vulnerabilities are addressed in versions 2.6.10rc3bk5 and 2.4rc of the Linux kernel, but this is not confirmed.
Please see the referenced advisories for more information.
RedHat Fedora Core1
-
RedHat kernel-2.4.22-1.2199.5.legacy.nptl.athlon.rpmFedora Core 1:
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-2.4.22-1
.2199.5.legacy.nptl.athlon.rpm -
RedHat kernel-2.4.22-1.2199.5.legacy.nptl.i586.rpmFedora Core 1:
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-2.4.22-1
.2199.5.legacy.nptl.i586.rpm -
RedHat kernel-2.4.22-1.2199.5.legacy.nptl.i686.rpmFedora Core 1:
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-2.4.22-1
.2199.5.legacy.nptl.i686.rpm -
RedHat kernel-BOOT-2.4.22-1.2199.5.legacy.nptl.i386.rpmFedora Core 1:
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-BOOT-2.4
.22-1.2199.5.legacy.nptl.i386.rpm -
RedHat kernel-doc-2.4.22-1.2199.5.legacy.nptl.i386.rpmFedora Core 1:
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-doc-2.4.
22-1.2199.5.legacy.nptl.i386.rpm -
RedHat kernel-smp-2.4.22-1.2199.5.legacy.nptl.athlon.rpmFedora Core 1:
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-smp-2.4.
22-1.2199.5.legacy.nptl.athlon.rpm -
RedHat kernel-smp-2.4.22-1.2199.5.legacy.nptl.i586.rpmFedora Core 1:
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-smp-2.4.
22-1.2199.5.legacy.nptl.i586.rpm -
RedHat kernel-smp-2.4.22-1.2199.5.legacy.nptl.i686.rpmFedora Core 1:
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-smp-2.4.
22-1.2199.5.legacy.nptl.i686.rpm -
RedHat kernel-source-2.4.22-1.2199.5.legacy.nptl.i386.rpmFedora Core 1:
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-source-2
.4.22-1.2199.5.legacy.nptl.i386.rpm
Linux kernel 2.4.17
-
Debian kernel-headers-2.4.17_2.4.17-0.020226.2.woody3_mips.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mip
s/kernel-headers-2.4.17_2.4.17-0.020226.2.woody3_mips.deb -
Debian kernel-headers-2.4.17_2.4.17-0.020226.2.woody3_mipsel.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mip
s/kernel-headers-2.4.17_2.4.17-0.020226.2.woody3_mipsel.deb -
Debian kernel-image-2.4.17-r3k-kn02_2.4.17-0.020226.2.woody3_mipsel.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mip
s/kernel-image-2.4.17-r3k-kn02_2.4.17-0.020226.2.woody3_mipsel.deb -
Debian kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody3_mips.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mip
s/kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody3_mips.deb -
Debian kernel-image-2.4.17-r4k-kn04_2.4.17-0.020226.2.woody3_mipsel.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mip
s/kernel-image-2.4.17-r4k-kn04_2.4.17-0.020226.2.woody3_mipsel.deb -
Debian kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody3_mips.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mip
s/kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody3_mips.deb -
Debian kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody3_all.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mip
s/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody3_all.deb -
Debian kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody4_all.debArchitecture Independent.
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mip
s/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody4_all.deb -
Debian mips-tools_2.4.17-0.020226.2.woody3_mipsel.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mip
s/mips-tools_2.4.17-0.020226.2.woody3_mipsel.deb -
Debian kernel-doc-2.4.17_2.4.17-1woody3_all.debDebian GNU/Linux 3.0 (woody)
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/ke
rnel-doc-2.4.17_2.4.17-1woody3_all.deb -
Debian kernel-doc-2.4.17_2.4.17-1woody4_all.debDebian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/ke
rnel-doc-2.4.17_2.4.17-1woody4_all.deb -
Debian kernel-headers-2.4.17-apus_2.4.17-5_powerpc.debDebian GNU/Linux 3.0 (woody)
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apu
s/kernel-headers-2.4.17-apus_2.4.17-5_powerpc.deb -
Debian kernel-headers-2.4.17-apus_2.4.17-6_powerpc.debDebian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apu
s/kernel-headers-2.4.17-apus_2.4.17-6_powerpc.deb - Debian kernel-headers-2.4.17-hppa_32.4_hppa
参考网址
来源: XF
名称: linux-ipoptionsget-memory-leak(18524)
链接:http://xforce.iss.net/xforce/xfdb/18524
来源: FULLDISC
名称: 20041215 fun with linux kernel
链接:http://www.securitytrap.com/mail/full-disclosure/2004/Dec/0323.html
来源: BID
名称: 11956
链接:http://www.securityfocus.com/bid/11956
来源: www.guninski.com
链接:http://www.guninski.com/where_do_you_want_billg_to_go_today_2.html
来源: BUGTRAQ
名称: 20041215 [USN-47-1] Linux kernel vulnerabilities
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=110383108211524&w=2
来源: OVAL
名称: oval:org.mitre.oval:def:11085
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11085
来源: REDHAT
名称: RHSA-2005:017
链接:http://www.redhat.com/support/errata/RHSA-2005-017.html
来源: REDHAT
名称: RHSA-2005:016
链接:http://www.redhat.com/support/errata/RHSA-2005-016.html
来源: DEBIAN
名称: DSA-1082
链接:http://www.debian.org/security/2006/dsa-1082
来源: DEBIAN
名称: DSA-1070
链接:http://www.debian.org/security/2006/dsa-1070
来源: DEBIAN
名称: DSA-1069
链接:http://www.debian.org/security/2006/dsa-1069
来源: DEBIAN
名称: DSA-1067
链接:http://www.debian.org/security/2006/dsa-1067
来源: SECUNIA
名称: 20338
链接:http://secunia.com/advisories/20338
来源: SECUNIA
名称: 20202
链接:http://secunia.com/advisories/20202
来源: SECUNIA
名称: 20163
链接:http://secunia.com/advisories/20163