Linux Kernel Signal_32.C 本地拒绝服务漏洞

漏洞信息详情

Linux Kernel Signal_32.C 本地拒绝服务漏洞

漏洞简介

Linux kernel 2.6.16.21和2.6.17之前版本在 PowerPC上运行时,未进行某些要求的 access_ok检查,可以使本地用户读取64位系统(signal_64.c)上的任意内核内存,引起拒绝服务(崩溃)并可能读取 32位系统(signal_32.c)上的内核内存。

漏洞公告

目前厂商已经发布了相关补丁,请到厂商的主页下载:

S.u.S.E. Linux Professional 10.1

SuSE apparmor-admin_en-10-7.5.noarch.rpm

SUSE LINUX 10.1:

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-admin_en-1 0-7.5.noarch.rpm

SuSE apparmor-docs-2.0-17.5.noarch.rpm

SUSE LINUX 10.1:

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-docs-2.0-1 7.5.noarch.rpm

SuSE apparmor-profiles-2.0-34.9.noarch.rpm

SUSE LINUX 10.1:

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-profiles-2 .0-34.9.noarch.rpm

SuSE apparmor-utils-2.0-23.5.noarch.rpm

SUSE LINUX 10.1:

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-utils-2.0- 23.5.noarch.rpm

SuSE yast2-apparmor-2.0-27.5.noarch.rpm

SUSE LINUX 10.1:

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/yast2-apparmor-2.0- 27.5.noarch.rpm

Linux kernel 2.6.10

Ubuntu acpi-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb

Ubuntu 5.04:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi -modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb

Ubuntu acpi-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb

Ubuntu 5.04:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi -modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb

Ubuntu cdrom-core-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb

Ubuntu 5.04:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdro m-core-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb

Ubuntu cdrom-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb

Ubuntu 5.04:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdro m-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb

Ubuntu cdrom-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb

Ubuntu 5.04:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdro m-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb

Ubuntu ext3-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb

Ubuntu 5.04:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3 -modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb

Ubuntu ext3-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb

Ubuntu 5.04:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3 -modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb

Ubuntu fat-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb

Ubuntu 5.04:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat- modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb

Ubuntu fat-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb

Ubuntu 5.04:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat- modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb

Ubuntu fb-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb

Ubuntu 5.04:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-m odules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb

Ubuntu fb-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb

Ubuntu 5.04:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-m odules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb

Ubuntu firewire-core-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb

Ubuntu 5.04:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fire wire-core-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb

Ubuntu firewire-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb

Ubuntu 5.04:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fire wire-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb

Ubuntu firmware-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb

Ubuntu 5.04:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firm ware-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb

Ubuntu firmware-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb

Ubuntu 5.04:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firm ware-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb

Ubuntu floppy-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb

Ubuntu 5.04:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fl

参考网址

来源: BID

名称: 18616

链接:http://www.securityfocus.com/bid/18616

来源: VUPEN

名称: ADV-2006-2451

链接:http://www.frsirt.com/english/advisories/2006/2451

来源: bugzilla.redhat.com

链接:https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=194215

来源: www.kernel.org

链接:http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.21

来源: www.kernel.org

链接:http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7c85d1f9d358b24c5b05c3a2783a78423775a080

来源: UBUNTU

名称: USN-311-1

链接:http://www.ubuntu.com/usn/usn-311-1

来源: TRUSTIX

名称: 2006-0037

链接:http://www.trustix.org/errata/2006/0037

来源: BUGTRAQ

名称: 20060623 rPSA-2006-0110-1 kernel

链接:http://www.securityfocus.com/archive/1/archive/1/438168/100/0/threaded

来源: REDHAT

名称: RHSA-2006:0575

链接:http://www.redhat.com/support/errata/RHSA-2006-0575.html

来源: SUSE

名称: SUSE-SA:2006:047

链接:http://www.novell.com/linux/security/advisories/2006_47_kernel.html

来源: SUSE

名称: SUSE-SA:2006:042

链接:http://www.novell.com/linux/security/advisories/2006_42_kernel.html

来源: support.avaya.com

链接:http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm

来源: SECUNIA

名称: 22417

链接:http://secunia.com/advisories/22417

来源: SECUNIA

名称: 21498

链接:http://secunia.com/advisories/21498

来源: SECUNIA

名称: 21465

链接:http://secunia.com/advisories/21465

来源: SECUNIA

名称: 21179

链接:http://secunia.com/advisories/21179

来源: SECUNIA

名称: 20991

链接:http://secunia.com/advisories/20991

来源: SECUNIA

名称: 20831

链接:http://secunia.com/advisories/20831

来源: SECUNIA

名称: 20703

链接:http://secunia.com/advisories/20703

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享