首页 -> 安全研究
安全研究
安全漏洞
Linux IXJ电话卡驱动2.4内核权限提升漏洞
发布日期:2002-10-17
更新日期:2002-10-22
受影响系统:
Linux kernel 2.4.9描述:
Linux kernel 2.4.8
Linux kernel 2.4.7
Linux kernel 2.4.6
Linux kernel 2.4.5
Linux kernel 2.4.4
Linux kernel 2.4.3
Linux kernel 2.4.2
Linux kernel 2.4.18pre-8
Linux kernel 2.4.18pre-7
Linux kernel 2.4.18pre-6
Linux kernel 2.4.18pre-5
Linux kernel 2.4.18pre-4
Linux kernel 2.4.18pre-3
Linux kernel 2.4.18pre-2
Linux kernel 2.4.18pre-1
Linux kernel 2.4.17
Linux kernel 2.4.16
Linux kernel 2.4.15
Linux kernel 2.4.14
Linux kernel 2.4.13
Linux kernel 2.4.12
Linux kernel 2.4.11
Linux kernel 2.4.10
Linux kernel 2.4.1
Linux kernel 2.4.18
- Mandrake Linux 8.2
- Mandrake Linux 8.1
- Mandrake Linux 8.0
- RedHat Linux 7.3
BUGTRAQ ID: 5985
CVE(CAN) ID: CVE-2002-1574
Linux 2.4 kernel是开放源代码的Linux内核系统。
Linux 2.4内核的ixj电话卡驱动存在问题,本地攻击者可以利用这个漏洞进行权限提升攻击。
Linux 2.4内核中的ixj电话卡驱动存在未明漏洞可导致权限提升。目前没有详细的漏洞细节描述。
<*来源:Silvio Cesare (silvio@qualys.com)
链接:https://www.redhat.com/support/errata/RHSA-2002-206.html
*>
建议:
厂商补丁:
RedHat
------
RedHat已经为此发布了一个安全公告(RHSA-2002:206-12)以及相应补丁:
RHSA-2002:206-12:New kernel fixes local security issues
链接:https://www.redhat.com/support/errata/RHSA-2002-206.html
补丁下载:
Red Hat Linux 7.3:
SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/kernel-2.4.18-17.7.x.src.rpm
ftp://updates.redhat.com/7.3/en/os/SRPMS/hwdata-0.14.1-1.src.rpm
ftp://updates.redhat.com/7.3/en/os/SRPMS/modutils-2.4.18-3.7x.src.rpm
athlon:
ftp://updates.redhat.com/7.3/en/os/athlon/kernel-2.4.18-17.7.x.athlon.rpm
ftp://updates.redhat.com/7.3/en/os/athlon/kernel-smp-2.4.18-17.7.x.athlon.rpm
i386:
ftp://updates.redhat.com/7.3/en/os/i386/kernel-2.4.18-17.7.x.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/kernel-source-2.4.18-17.7.x.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/kernel-doc-2.4.18-17.7.x.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/kernel-BOOT-2.4.18-17.7.x.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/modutils-2.4.18-3.7x.i386.rpm
i586:
ftp://updates.redhat.com/7.3/en/os/i586/kernel-2.4.18-17.7.x.i586.rpm
ftp://updates.redhat.com/7.3/en/os/i586/kernel-smp-2.4.18-17.7.x.i586.rpm
i686:
ftp://updates.redhat.com/7.3/en/os/i686/kernel-2.4.18-17.7.x.i686.rpm
ftp://updates.redhat.com/7.3/en/os/i686/kernel-smp-2.4.18-17.7.x.i686.rpm
ftp://updates.redhat.com/7.3/en/os/i686/kernel-bigmem-2.4.18-17.7.x.i686.rpm
ftp://updates.redhat.com/7.3/en/os/i686/kernel-debug-2.4.18-17.7.x.i686.rpm
noarch:
ftp://updates.redhat.com/7.3/en/os/noarch/hwdata-0.14.1-1.noarch.rpm
Red Hat Linux 8.0:
SRPMS:
ftp://updates.redhat.com/8.0/en/os/SRPMS/kernel-2.4.18-17.8.0.src.rpm
ftp://updates.redhat.com/8.0/en/os/SRPMS/hwdata-0.48-1.src.rpm
athlon:
ftp://updates.redhat.com/8.0/en/os/athlon/kernel-2.4.18-17.8.0.athlon.rpm
ftp://updates.redhat.com/8.0/en/os/athlon/kernel-smp-2.4.18-17.8.0.athlon.rpm
i386:
ftp://updates.redhat.com/8.0/en/os/i386/kernel-2.4.18-17.8.0.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/kernel-source-2.4.18-17.8.0.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/kernel-doc-2.4.18-17.8.0.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/kernel-BOOT-2.4.18-17.8.0.i386.rpm
i586:
ftp://updates.redhat.com/8.0/en/os/i586/kernel-2.4.18-17.8.0.i586.rpm
ftp://updates.redhat.com/8.0/en/os/i586/kernel-smp-2.4.18-17.8.0.i586.rpm
i686:
ftp://updates.redhat.com/8.0/en/os/i686/kernel-2.4.18-17.8.0.i686.rpm
ftp://updates.redhat.com/8.0/en/os/i686/kernel-smp-2.4.18-17.8.0.i686.rpm
ftp://updates.redhat.com/8.0/en/os/i686/kernel-bigmem-2.4.18-17.8.0.i686.rpm
ftp://updates.redhat.com/8.0/en/os/i686/kernel-debug-2.4.18-17.8.0.i686.rpm
noarch:
ftp://updates.redhat.com/8.0/en/os/noarch/hwdata-0.48-1.noarch.rpm
可使用下列命令安装补丁:
rpm -Fvh [文件名]
浏览次数:3081
严重程度:0(网友投票)
绿盟科技给您安全的保障