首页 -> 安全研究

安全研究

安全漏洞
Linux Kernel Vicam USB驱动用户空间/内核内存拷贝漏洞

发布日期:2004-02-18
更新日期:2004-02-25

受影响系统:
Linux kernel 2.4.9
Linux kernel 2.4.8
Linux kernel 2.4.7
Linux kernel 2.4.6
Linux kernel 2.4.5
Linux kernel 2.4.4
Linux kernel 2.4.3
Linux kernel 2.4.24
Linux kernel 2.4.23
Linux kernel 2.4.22
Linux kernel 2.4.21
Linux kernel 2.4.20
Linux kernel 2.4.2
Linux kernel 2.4.19
Linux kernel 2.4.17
Linux kernel 2.4.16
Linux kernel 2.4.15
Linux kernel 2.4.14
Linux kernel 2.4.13
Linux kernel 2.4.12
Linux kernel 2.4.11
Linux kernel 2.4.10
Linux kernel 2.4.1
Linux kernel 2.4
Linux kernel 2.4.18
    - Debian Linux 3.0
    - Mandrake Linux 8.2
    - Mandrake Linux 8.1
    - Mandrake Linux 8.0
    - RedHat Linux 8.0
    - RedHat Linux 7.3
    - SuSE Linux 8.2
    - SuSE Linux 8.1
    - SuSE Linux 8.0
    - SuSE Linux 7.3
    - SuSE Linux 7.2
    - SuSE Linux 7.1
    - Turbo Linux 7.0
不受影响系统:
Linux kernel 2.4.25
描述:
BUGTRAQ  ID: 9690
CVE(CAN) ID: CVE-2004-0075

Linux是一款开放源代码操作系统。

Linux内核Vicam USB驱动不安全访问用户空间内存,本地攻击者可以利用这个漏洞进行拒绝服务攻击,或提升权限。

Vicam USB驱动没有使用copy_from_user函数来访问用户空间,可能导致拒绝服务攻击,或提升权限。目前没有详细漏洞细节提供。

<*来源:Red Hat advisory
  
  链接:https://www.redhat.com/support/errata/RHSA-2004-065.html
        *>

建议:
厂商补丁:

Linux
-----
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

Linux Upgrade linux-2.4.25.tar.bz2
http://www.kernel.org/pub/linux/kernel/v2.4/linux-2.4.25.tar.bz2

RedHat
------
RedHat已经为此发布了一个安全公告(RHSA-2004:065-01)以及相应补丁:
RHSA-2004:065-01:Updated kernel packages resolve security vulnerabilities
链接:https://www.redhat.com/support/errata/RHSA-2004-065.html

补丁下载:

Red Hat Linux 9:

SRPMS:
ftp://updates.redhat.com/9/en/os/SRPMS/kernel-2.4.20-30.9.src.rpm

athlon:
ftp://updates.redhat.com/9/en/os/athlon/kernel-2.4.20-30.9.athlon.rpm
ftp://updates.redhat.com/9/en/os/athlon/kernel-smp-2.4.20-30.9.athlon.rpm

i386:
ftp://updates.redhat.com/9/en/os/i386/kernel-2.4.20-30.9.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/kernel-BOOT-2.4.20-30.9.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/kernel-doc-2.4.20-30.9.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/kernel-source-2.4.20-30.9.i386.rpm

i686:
ftp://updates.redhat.com/9/en/os/i686/kernel-2.4.20-30.9.i686.rpm
ftp://updates.redhat.com/9/en/os/i686/kernel-bigmem-2.4.20-30.9.i686.rpm
ftp://updates.redhat.com/9/en/os/i686/kernel-smp-2.4.20-30.9.i686.rpm
可使用下列命令安装补丁:

rpm -Fvh [文件名]

S.u.S.E.
--------
S.u.S.E.已经为此发布了一个安全公告(SuSE-SA:2004:005)以及相应补丁:
SuSE-SA:2004:005:Linux Kernel
链接:

补丁下载:

SuSE Upgrade k_deflt-2.4.20-105.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/k_deflt-2.4.20-105.i586.rpm
Intel i386 Platform

SuSE Upgrade k_athlon-2.4.20-105.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/k_athlon-2.4.20-105.i586.rpm
Intel i386 Platform

SuSE Upgrade k_psmp-2.4.20-105.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/k_psmp-2.4.20-105.i586.rpm
Intel i386 Platform

SuSE Upgrade k_smp-2.4.20-105.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/k_smp-2.4.20-105.i586.rpm
Intel i386 Platform

SuSE Upgrade k_deflt-2.4.21-192.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/k_deflt-2.4.21-192.i586.rpm
Intel i386 Platform

SuSE Upgrade k_smp-2.4.21-192.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/k_smp-2.4.21-192.i586.rpm
Intel i386 Platform

SuSE Upgrade k_smp4G-2.4.21-192.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/k_smp4G-2.4.21-192.i586.rpm
Intel i386 Platform

SuSE Upgrade k_um-2.4.21-192.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/k_um-2.4.21-192.i586.rpm
Intel i386 Platform

SuSE Upgrade k_athlon-2.4.21-192.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/k_athlon-2.4.21-192.i586.rpm
Intel i386 Platform

SuSE Upgrade k_deflt-2.4.21-189.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/k_deflt-2.4.21-189.i586.rpm
Intel i386 Platform/SuSE 8.1

SuSE Upgrade k_athlon-2.4.21-189.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/k_athlon-2.4.21-189.i586.rpm
Intel i386 Platform/SuSE 8.1

SuSE Upgrade k_psmp-2.4.21-189.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/k_psmp-2.4.21-189.i586.rpm
Intel i386 Platform/SuSE 8.1

SuSE Upgrade k_smp-2.4.21-189.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/k_smp-2.4.21-189.i586.rpm
Intel i386 Platform/SuSE 8.1

SuSE Upgrade k_deflt-2.4.21-201.x86_64.rpm
ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/k_deflt-2.4.21-201.x86_64.rpm
x86_64/SuSE 9.0

SuSE Upgrade k_smp-2.4.21-201.x86_64.rpm
ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/k_smp-2.4.21-201.x86_64.rpm
x86_64/SuSE 9.0

浏览次数:3497
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障