Linux Kernel本地拒绝服务漏洞

漏洞信息详情

Linux Kernel本地拒绝服务漏洞

漏洞简介

Linux Kernel是开放源代码操作系统Linux的内核。

Linux Kernel的Netfilter组件代码中存在的内存泄漏,本地攻击攻击者可能利用此漏洞对致Linux Kernel执行拒绝服务攻击。

漏洞公告

目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:

Linux kernel 2.6.4

SuSE kernel-bigsmp-2.6.5-7.151.i586.rpm

ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-bigsmp-2.6 .5-7.151.i586.rpm

SuSE kernel-default-2.6.5-7.151.i586.rpm

ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-default-2. 6.5-7.151.i586.rpm

SuSE kernel-default-2.6.5-7.151.x86_64.rpm

ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-defaul t-2.6.5-7.151.x86_64.rpm

SuSE kernel-docs-2.6.5-7.151.noarch.rpm

ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/noarch/kernel-docs-2.6 .5-7.151.noarch.rpm

SuSE kernel-smp-2.6.5-7.151.i586.rpm

ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-smp-2.6.5- 7.151.i586.rpm

SuSE kernel-smp-2.6.5-7.151.x86_64.rpm

ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-smp-2. 6.5-7.151.x86_64.rpm

SuSE kernel-source-2.6.5-7.151.i586.rpm

ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-source-2.6 .5-7.151.i586.rpm

SuSE kernel-source-2.6.5-7.151.x86_64.rpm

ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-source -2.6.5-7.151.x86_64.rpm

SuSE kernel-syms-2.6.5-7.151.i586.rpm

ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-syms-2.6.5 -7.151.i586.rpm

SuSE kernel-syms-2.6.5-7.151.x86_64.rpm

ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-syms-2 .6.5-7.151.x86_64.rpm

SuSE ltmodem-2.6.2-38.14.i586.rpm

ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/ltmodem-2.6.2-38. 14.i586.rpm

Linux kernel 2.6.5

Conectiva drbd-utils-0.7.10-71689U10_2cl.i386.rpm

ftp://atualizacoes.conectiva.com.br/10/RPMS/drbd-utils-0.7.10-71689U10 _2cl.i386.rpm

Conectiva drbd-utils-heartbeat-0.7.10-71689U10_2cl.i386.rpm

ftp://atualizacoes.conectiva.com.br/10/RPMS/drbd-utils-heartbeat-0.7.1 0-71689U10_2cl.i386.rpm

Conectiva hsfmodem-progs-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.i386.rpm

ftp://atualizacoes.conectiva.com.br/10/RPMS/hsfmodem-progs-2.6.11.7203 2U10_16cl.7.18.00.03full-63167U10_5cl.i386.rpm

Conectiva kernel26-2.6.11-72032U10_16cl.athlon.rpm

ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-2.6.11-72032U10_1 6cl.athlon.rpm

Conectiva kernel26-2.6.11-72032U10_16cl.i386.rpm

ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-2.6.11-72032U10_1 6cl.i386.rpm

Conectiva kernel26-2.6.11-72032U10_16cl.i586.rpm

ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-2.6.11-72032U10_1 6cl.i586.rpm

Conectiva kernel26-2.6.11-72032U10_16cl.i686.rpm

ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-2.6.11-72032U10_1 6cl.i686.rpm

Conectiva kernel26-2.6.11-72032U10_16cl.pentium4.rpm

ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-2.6.11-72032U10_1 6cl.pentium4.rpm

Conectiva kernel26-BOOT-2.6.11-72032U10_16cl.i386.rpm

ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-2.6.11-72032 U10_16cl.i386.rpm

Conectiva kernel26-BOOT-module-drbd-2.6.11.72032U10_16cl.0.7.10-71801U10_5cl.i386.rpm

ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-module-drbd- 2.6.11.72032U10_16cl.0.7.10-71801U10_5cl.i386.rpm

Conectiva kernel26-BOOT-module-hsfmodem-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.i386.rpm

ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-module-hsfmo dem-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.i386.rpm

Conectiva kernel26-BOOT-module-madwifi-2.6.11.72032U10_16cl.20041216-63166U10_5cl.i386.rpm

ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-module-madwi fi-2.6.11.72032U10_16cl.20041216-63166U10_5cl.i386.rpm

Conectiva kernel26-BOOT-module-ndiswrapper-2.6.11.72032U10_16cl.1.1-72907U10_3cl.i386.rpm

ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-module-ndisw rapper-2.6.11.72032U10_16cl.1.1-72907U10_3cl.i386.rpm

Conectiva kernel26-BOOT-module-nvidia-2.6.11.72032U10_16cl.1.0.7167-71023U10_6cl.i386.rpm

ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-module-nvidi a-2.6.11.72032U10_16cl.1.0.7167-71023U10_6cl.i386.rpm

Conectiva kernel26-BOOT-module-slmodem-2.6.11.72032U10_16cl.2.9.10-63168U10_6cl.i386.rpm

ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-m

参考网址

来源: SUSE

名称: SUSE-SA:2005:018

链接:http://www.novell.com/linux/security/advisories/2005_18_kernel.html

来源: BUGTRAQ

名称: 20050315 [USN-95-1] Linux kernel vulnerabilities

链接:http://marc.theaimsgroup.com/?l=bugtraq&m=111091402626556&w=2

来源: CONECTIVA

名称: CLA-2005:945

链接:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000945

来源: BID

名称: 12816

链接:http://www.securityfocus.com/bid/12816

来源: OSVDB

名称: 14966

链接:http://www.osvdb.org/14966

来源: MANDRIVA

名称: MDKSA-2005:219

链接:http://www.mandriva.com/security/advisories?name=MDKSA-2005:219

来源: MANDRAKE

名称: MDKSA-2005:218

链接:http://www.mandriva.com/security/advisories?name=MDKSA-2005:218

来源: VUPEN

名称: ADV-2005-1878

链接:http://www.frsirt.com/english/advisories/2005/1878

来源: SECUNIA

名称: 17826

链接:http://secunia.com/advisories/17826

来源: SECUNIA

名称: 17002

链接:http://secunia.com/advisories/17002

来源: SECUNIA

名称: 14295

链接:http://secunia.com/advisories/14295

来源: REDHAT

名称: RHSA-2005:663

链接:http://rhn.redhat.com/errata/RHSA-2005-663.html

来源: REDHAT

名称: RHSA-2005:366

链接:http://rhn.redhat.com/errata/RHSA-2005-366.html

来源: MANDRIVA

名称: MDKSA-2005:219

链接:http://frontal2.mandriva.com/security/advisories?name=MDKSA-2005:219

来源: MANDRAKE

名称: MDKSA-2005:218

链接:http://frontal2.mandriva.com/security/advisories?name=MDKSA-2005:218

受影响实体

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享