漏洞信息详情
Linux Kernel Signal_32.C 本地拒绝服务漏洞
- CNNVD编号:CNNVD-200606-479
- 危害等级: 中危
- CVE编号:
CVE-2006-2448
- 漏洞类型:
设计错误
- 发布时间:
2006-06-23
- 威胁类型:
本地
- 更新时间:
2006-06-27
- 厂 商:
linux - 漏洞来源:
Linux -
漏洞简介
Linux kernel 2.6.16.21和2.6.17之前版本在 PowerPC上运行时,未进行某些要求的 access_ok检查,可以使本地用户读取64位系统(signal_64.c)上的任意内核内存,引起拒绝服务(崩溃)并可能读取 32位系统(signal_32.c)上的内核内存。
漏洞公告
目前厂商已经发布了相关补丁,请到厂商的主页下载:
S.u.S.E. Linux Professional 10.1
SuSE apparmor-admin_en-10-7.5.noarch.rpm
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-admin_en-1 0-7.5.noarch.rpm
SuSE apparmor-docs-2.0-17.5.noarch.rpm
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-docs-2.0-1 7.5.noarch.rpm
SuSE apparmor-profiles-2.0-34.9.noarch.rpm
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-profiles-2 .0-34.9.noarch.rpm
SuSE apparmor-utils-2.0-23.5.noarch.rpm
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-utils-2.0- 23.5.noarch.rpm
SuSE yast2-apparmor-2.0-27.5.noarch.rpm
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/yast2-apparmor-2.0- 27.5.noarch.rpm
Linux kernel 2.6.10
Ubuntu acpi-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi -modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
Ubuntu acpi-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi -modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
Ubuntu cdrom-core-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdro m-core-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
Ubuntu cdrom-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdro m-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
Ubuntu cdrom-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdro m-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
Ubuntu ext3-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3 -modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
Ubuntu ext3-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3 -modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
Ubuntu fat-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat- modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
Ubuntu fat-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat- modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
Ubuntu fb-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-m odules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
Ubuntu fb-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-m odules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
Ubuntu firewire-core-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fire wire-core-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
Ubuntu firewire-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fire wire-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
Ubuntu firmware-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firm ware-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
Ubuntu firmware-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firm ware-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
Ubuntu floppy-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fl
参考网址
来源: BID
名称: 18616
链接:http://www.securityfocus.com/bid/18616
来源: VUPEN
名称: ADV-2006-2451
链接:http://www.frsirt.com/english/advisories/2006/2451
来源: bugzilla.redhat.com
链接:https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=194215
来源: www.kernel.org
链接:http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.21
来源: www.kernel.org
来源: UBUNTU
名称: USN-311-1
链接:http://www.ubuntu.com/usn/usn-311-1
来源: TRUSTIX
名称: 2006-0037
链接:http://www.trustix.org/errata/2006/0037
来源: BUGTRAQ
名称: 20060623 rPSA-2006-0110-1 kernel
链接:http://www.securityfocus.com/archive/1/archive/1/438168/100/0/threaded
来源: REDHAT
名称: RHSA-2006:0575
链接:http://www.redhat.com/support/errata/RHSA-2006-0575.html
来源: SUSE
名称: SUSE-SA:2006:047
链接:http://www.novell.com/linux/security/advisories/2006_47_kernel.html
来源: SUSE
名称: SUSE-SA:2006:042
链接:http://www.novell.com/linux/security/advisories/2006_42_kernel.html
来源: support.avaya.com
链接:http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm
来源: SECUNIA
名称: 22417
链接:http://secunia.com/advisories/22417
来源: SECUNIA
名称: 21498
链接:http://secunia.com/advisories/21498
来源: SECUNIA
名称: 21465
链接:http://secunia.com/advisories/21465
来源: SECUNIA
名称: 21179
链接:http://secunia.com/advisories/21179
来源: SECUNIA
名称: 20991
链接:http://secunia.com/advisories/20991
来源: SECUNIA
名称: 20831
链接:http://secunia.com/advisories/20831
来源: SECUNIA
名称: 20703