CVE-2003-0248
CVSS10.0
发布时间 :2003-06-16 00:00:00
修订时间 :2008-09-10 15:18:23
NMCOS    

[原文]The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address.


[CNNVD]RedHat Linux内核MXCSR处理未明漏洞(CNNVD-200306-085)

        
        RedHat是一款免费开放源代码的Linux操作系统。
        RedHat Linux内核MXCSR处理器代码存在未明漏洞,本地攻击者可以利用这个漏洞可能导致系统崩溃。
        当低级MXCSR内核代码处理畸形地址时会出发此漏洞,问题可能是垃圾数据保留在CPU状态寄存器引起。
        

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:redhat:linux:9.0::i386
cpe:/o:redhat:linux:7.3Red Hat Linux 7.3
cpe:/o:redhat:linux:8.0Red Hat Linux 8.0
cpe:/o:redhat:linux:7.1Red Hat Linux 7.1
cpe:/o:redhat:linux:7.2Red Hat Linux 7.2

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:292Linux Kernel mxcsr Code Vulnerability
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0248
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0248
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200306-085
(官方数据源) CNNVD

- 其它链接及资源

http://www.redhat.com/support/errata/RHSA-2003-187.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2003:187
http://www.debian.org/security/2003/dsa-311
(VENDOR_ADVISORY)  DEBIAN  DSA-311
http://www.turbolinux.com/security/TLSA-2003-41.txt
(UNKNOWN)  TURBO  TLSA-2003-41
http://www.redhat.com/support/errata/RHSA-2003-195.html
(UNKNOWN)  REDHAT  RHSA-2003:195
http://www.debian.org/security/2004/dsa-442
(UNKNOWN)  DEBIAN  DSA-442
http://www.debian.org/security/2003/dsa-336
(UNKNOWN)  DEBIAN  DSA-336
http://www.debian.org/security/2003/dsa-332
(UNKNOWN)  DEBIAN  DSA-332
http://www.debian.org/security/2003/dsa-312
(UNKNOWN)  DEBIAN  DSA-312
http://www.mandriva.com/security/advisories?name=MDKSA-2003:074
(UNKNOWN)  MANDRAKE  MDKSA-2003:074
http://www.mandriva.com/security/advisories?name=MDKSA-2003:066
(UNKNOWN)  MANDRAKE  MDKSA-2003:066

- 漏洞信息

RedHat Linux内核MXCSR处理未明漏洞
危急 其他
2003-06-16 00:00:00 2005-10-20 00:00:00
本地  
        
        RedHat是一款免费开放源代码的Linux操作系统。
        RedHat Linux内核MXCSR处理器代码存在未明漏洞,本地攻击者可以利用这个漏洞可能导致系统崩溃。
        当低级MXCSR内核代码处理畸形地址时会出发此漏洞,问题可能是垃圾数据保留在CPU状态寄存器引起。
        

- 公告与补丁

        厂商补丁:
        RedHat
        ------
        RedHat已经为此发布了一个安全公告(RHSA-2003:187-01)以及相应补丁:
        RHSA-2003:187-01:Updated 2.4 kernel fixes vulnerabilities and driver bugs
        链接:https://www.redhat.com/support/errata/RHSA-2003-187.html
        补丁下载:
        Red Hat Linux 7.1:
        SRPMS:
        ftp://updates.redhat.com/7.1/en/os/SRPMS/kernel-2.4.20-18.7.src.rpm
        ftp://updates.redhat.com/7.1/en/os/SRPMS/quota-3.06-9.71.src.rpm
        athlon:
        ftp://updates.redhat.com/7.1/en/os/athlon/kernel-2.4.20-18.7.athlon.rpm
        ftp://updates.redhat.com/7.1/en/os/athlon/kernel-smp-2.4.20-18.7.athlon.rpm
        i386:
        ftp://updates.redhat.com/7.1/en/os/i386/kernel-2.4.20-18.7.i386.rpm
        ftp://updates.redhat.com/7.1/en/os/i386/kernel-source-2.4.20-18.7.i386.rpm
        ftp://updates.redhat.com/7.1/en/os/i386/kernel-doc-2.4.20-18.7.i386.rpm
        ftp://updates.redhat.com/7.1/en/os/i386/kernel-BOOT-2.4.20-18.7.i386.rpm
        ftp://updates.redhat.com/7.1/en/os/i386/quota-3.06-9.71.i386.rpm
        i586:
        ftp://updates.redhat.com/7.1/en/os/i586/kernel-2.4.20-18.7.i586.rpm
        ftp://updates.redhat.com/7.1/en/os/i586/kernel-smp-2.4.20-18.7.i586.rpm
        i686:
        ftp://updates.redhat.com/7.1/en/os/i686/kernel-2.4.20-18.7.i686.rpm
        ftp://updates.redhat.com/7.1/en/os/i686/kernel-smp-2.4.20-18.7.i686.rpm
        ftp://updates.redhat.com/7.1/en/os/i686/kernel-bigmem-2.4.20-18.7.i686.rpm
        Red Hat Linux 7.2:
        SRPMS:
        ftp://updates.redhat.com/7.2/en/os/SRPMS/kernel-2.4.20-18.7.src.rpm
        ftp://updates.redhat.com/7.2/en/os/SRPMS/quota-3.06-9.7.src.rpm
        athlon:
        ftp://updates.redhat.com/7.2/en/os/athlon/kernel-2.4.20-18.7.athlon.rpm
        ftp://updates.redhat.com/7.2/en/os/athlon/kernel-smp-2.4.20-18.7.athlon.rpm
        i386:
        ftp://updates.redhat.com/7.2/en/os/i386/kernel-2.4.20-18.7.i386.rpm
        ftp://updates.redhat.com/7.2/en/os/i386/kernel-source-2.4.20-18.7.i386.rpm
        ftp://updates.redhat.com/7.2/en/os/i386/kernel-doc-2.4.20-18.7.i386.rpm
        ftp://updates.redhat.com/7.2/en/os/i386/kernel-BOOT-2.4.20-18.7.i386.rpm
        ftp://updates.redhat.com/7.2/en/os/i386/quota-3.06-9.7.i386.rpm
        i586:
        ftp://updates.redhat.com/7.2/en/os/i586/kernel-2.4.20-18.7.i586.rpm
        ftp://updates.redhat.com/7.2/en/os/i586/kernel-smp-2.4.20-18.7.i586.rpm
        i686:
        ftp://updates.redhat.com/7.2/en/os/i686/kernel-2.4.20-18.7.i686.rpm
        ftp://updates.redhat.com/7.2/en/os/i686/kernel-smp-2.4.20-18.7.i686.rpm
        ftp://updates.redhat.com/7.2/en/os/i686/kernel-bigmem-2.4.20-18.7.i686.rpm
        Red Hat Linux 7.3:
        SRPMS:
        ftp://updates.redhat.com/7.3/en/os/SRPMS/kernel-2.4.20-18.7.src.rpm
        ftp://updates.redhat.com/7.3/en/os/SRPMS/quota-3.06-9.7.src.rpm
        athlon:
        ftp://updates.redhat.com/7.3/en/os/athlon/kernel-2.4.20-18.7.athlon.rpm
        ftp://updates.redhat.com/7.3/en/os/athlon/kernel-smp-2.4.20-18.7.athlon.rpm
        i386:
        ftp://updates.redhat.com/7.3/en/os/i386/kernel-2.4.20-18.7.i386.rpm
        ftp://updates.redhat.com/7.3/en/os/i386/kernel-source-2.4.20-18.7.i386.rpm
        ftp://updates.redhat.com/7.3/en/os/i386/kernel-doc-2.4.20-18.7.i386.rpm
        ftp://updates.redhat.com/7.3/en/os/i386/kernel-BOOT-2.4.20-18.7.i386.rpm
        ftp://updates.redhat.com/7.3/en/os/i386/quota-3.06-9.7.i386.rpm
        i586:
        ftp://updates.redhat.com/7.3/en/os/i586/kernel-2.4.20-18.7.i586.rpm
        ftp://updates.redhat.com/7.3/en/os/i586/kernel-smp-2.4.20-18.7.i586.rpm
        i686:
        ftp://updates.redhat.com/7.3/en/os/i686/kernel-2.4.20-18.7.i686.rpm
        ftp://updates.redhat.com/7.3/en/os/i686/kernel-smp-2.4.20-18.7.i686.rpm
        ftp://updates.redhat.com/7.3/en/os/i686/kernel-bigmem-2.4.20-18.7.i686.rpm
        Red Hat Linux 8.0:
        SRPMS:
        ftp://updates.redhat.com/8.0/en/os/SRPMS/kernel-2.4.20-18.8.src.rpm
        athlon:
        ftp://updates.redhat.com/8.0/en/os/athlon/kernel-2.4.20-18.8.athlon.rpm
        

- 漏洞信息

4456
Linux Kernel mxcsr CPU State Register Modification
Local Access Required Denial of Service
Loss of Availability
Exploit Unknown

- 漏洞描述

Linux kernel contains a flaw that may allow a local denial of service. The issue is triggered when the Linux kernel function "set_fpxregs" doesn't consider the "__copy_from_user" failed condition. This could cause the contents of the MXCSR register to be corrupted, and potentially cause a reserved bit within the register to be unexpectedly set, resulting in loss of availability for the platform.

- 时间线

2003-06-03 Unknow
Unknow Unknow

- 解决方案

Upgrade the linux kernel to version 2.4.23 or higher, as it has been reported to fix this vulnerability. This can be done through various Linux vendor patches or manually installing a newer kernel. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Linux Kernel FPU/SSE Environment Restoration MXCSR Register Corruption Vulnerability
Failure to Handle Exceptional Conditions 7793
No Yes
2003-06-03 12:00:00 2009-07-11 10:06:00
Discovery of this vulnerability credited to Andrea Arcangeli.

- 受影响的程序版本

RedHat Linux 9.0 i386
RedHat Linux 8.0 i686
RedHat Linux 8.0 i386
RedHat Linux 8.0
RedHat Linux 7.3 i686
RedHat Linux 7.3 i386
RedHat Linux 7.3
RedHat Linux 7.2 i686
RedHat Linux 7.2 i586
RedHat Linux 7.2 i386
RedHat Linux 7.2 athlon
RedHat Linux 7.2
RedHat Linux 7.1 i686
RedHat Linux 7.1 i586
RedHat Linux 7.1 i386
RedHat Linux 7.1
RedHat Enterprise Linux WS 2.1
RedHat Enterprise Linux ES 2.1
Red Hat Enterprise Linux AS 2.1
Mandriva Linux Mandrake 9.1 ppc
Mandriva Linux Mandrake 9.1
Mandriva Linux Mandrake 9.0
Mandriva Linux Mandrake 8.2 ppc
Mandriva Linux Mandrake 8.2
MandrakeSoft Multi Network Firewall 2.0
MandrakeSoft Corporate Server 2.1
Linux kernel 2.5.69
Linux kernel 2.5.68
Linux kernel 2.5.67
Linux kernel 2.5.66
Linux kernel 2.5.65
Linux kernel 2.5.64
Linux kernel 2.5.63
Linux kernel 2.5.62
Linux kernel 2.5.61
Linux kernel 2.5.60
Linux kernel 2.5.59
Linux kernel 2.5.58
Linux kernel 2.5.57
Linux kernel 2.5.56
Linux kernel 2.5.55
Linux kernel 2.5.54
Linux kernel 2.5.53
Linux kernel 2.5.52
Linux kernel 2.5.51
Linux kernel 2.5.50
Linux kernel 2.5.49
Linux kernel 2.5.48
Linux kernel 2.5.47
Linux kernel 2.5.46
Linux kernel 2.5.45
Linux kernel 2.5.44
Linux kernel 2.5.43
Linux kernel 2.5.42
Linux kernel 2.5.41
Linux kernel 2.5.40
Linux kernel 2.5.39
Linux kernel 2.5.38
Linux kernel 2.5.37
Linux kernel 2.5.36
Linux kernel 2.5.35
Linux kernel 2.5.34
Linux kernel 2.5.33
Linux kernel 2.5.32
Linux kernel 2.5.31
Linux kernel 2.5.30
Linux kernel 2.5.29
Linux kernel 2.5.28
Linux kernel 2.5.27
Linux kernel 2.5.26
Linux kernel 2.5.25
Linux kernel 2.5.24
Linux kernel 2.5.23
Linux kernel 2.5.22
Linux kernel 2.5.21
Linux kernel 2.5.20
Linux kernel 2.5.19
Linux kernel 2.5.18
Linux kernel 2.5.17
Linux kernel 2.5.16
Linux kernel 2.5.15
Linux kernel 2.5.14
Linux kernel 2.5.13
Linux kernel 2.5.12
Linux kernel 2.5.11
Linux kernel 2.5.10
Linux kernel 2.5.9
Linux kernel 2.5.8
Linux kernel 2.5.7
Linux kernel 2.5.6
Linux kernel 2.5.5
Linux kernel 2.5.4
Linux kernel 2.5.3
Linux kernel 2.5.2
Linux kernel 2.5.1
Linux kernel 2.5 .0
Linux kernel 2.4.21 pre4
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
Linux kernel 2.4.21 pre1
Linux kernel 2.4.21
+ Conectiva Linux 9.0
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
+ Red Hat Enterprise Linux AS 3
+ RedHat Desktop 3.0
+ RedHat Enterprise Linux ES 3
+ RedHat Enterprise Linux WS 3
+ S.u.S.E. Linux Personal 9.0 x86_64
+ S.u.S.E. Linux Personal 9.0
+ SuSE SUSE Linux Enterprise Server 8
Linux kernel 2.4.20
Linux kernel 2.4.19 -pre6
Linux kernel 2.4.19 -pre5
Linux kernel 2.4.19 -pre4
Linux kernel 2.4.19 -pre3
Linux kernel 2.4.19 -pre2
Linux kernel 2.4.19 -pre1
Linux kernel 2.4.19
Linux kernel 2.4.18 pre-8
Linux kernel 2.4.18 pre-7
Linux kernel 2.4.18 pre-6
Linux kernel 2.4.18 pre-5
Linux kernel 2.4.18 pre-4
Linux kernel 2.4.18 pre-3
Linux kernel 2.4.18 pre-2
Linux kernel 2.4.18 pre-1
Linux kernel 2.4.18 x86
Linux kernel 2.4.18
Linux kernel 2.4.17
Linux kernel 2.4.16
Linux kernel 2.4.15
Linux kernel 2.4.14
Linux kernel 2.4.13
+ Caldera OpenLinux Server 3.1.1
+ Caldera OpenLinux Workstation 3.1.1
Linux kernel 2.4.12
+ Conectiva Linux 7.0
Linux kernel 2.4.11
Linux kernel 2.4.10
Linux kernel 2.4.9
Linux kernel 2.4.8
Linux kernel 2.4.7
+ RedHat Linux 7.2
+ S.u.S.E. Linux 7.2
+ S.u.S.E. Linux 7.1
Linux kernel 2.4.6
Linux kernel 2.4.5
+ Slackware Linux 8.0
Linux kernel 2.4.4
Linux kernel 2.4.3
Linux kernel 2.4.2
Linux kernel 2.4.1
Linux kernel 2.4 .0-test9
Linux kernel 2.4 .0-test8
Linux kernel 2.4 .0-test7
Linux kernel 2.4 .0-test6
Linux kernel 2.4 .0-test5
Linux kernel 2.4 .0-test4
Linux kernel 2.4 .0-test3
Linux kernel 2.4 .0-test2
Linux kernel 2.4 .0-test12
Linux kernel 2.4 .0-test11
Linux kernel 2.4 .0-test10
Linux kernel 2.4 .0-test1
Linux kernel 2.4
Linux kernel 2.3.99 -pre7
Linux kernel 2.3.99 -pre6
Linux kernel 2.3.99 -pre5
Linux kernel 2.3.99 -pre4
Linux kernel 2.3.99 -pre3
Linux kernel 2.3.99 -pre2
Linux kernel 2.3.99 -pre1
Linux kernel 2.3.99
Linux kernel 2.3 .x
Linux kernel 2.3
Linux kernel 2.2.25
Linux kernel 2.2.24
Linux kernel 2.2.23
Linux kernel 2.2.22
Linux kernel 2.2.21
Linux kernel 2.2.20
+ Mandriva Linux Mandrake 8.2 ppc
+ Mandriva Linux Mandrake 8.2
Linux kernel 2.2.19
Linux kernel 2.2.18
+ Caldera OpenLinux 2.4
+ Conectiva Linux 6.0
+ Conectiva Linux 5.1
+ Conectiva Linux 5.0
+ Conectiva Linux 4.2
+ Conectiva Linux 4.1
+ Conectiva Linux 4.0 es
+ Conectiva Linux 4.0
+ Conectiva Linux graficas
+ Conectiva Linux ecommerce
+ Debian Linux 2.2 sparc
+ Debian Linux 2.2 powerpc
+ Debian Linux 2.2 arm
+ Debian Linux 2.2 alpha
+ Debian Linux 2.2 68k
+ Debian Linux 2.2
+ Mandriva Linux Mandrake 7.2
+ Mandriva Linux Mandrake 7.1
+ Mandriva Linux Mandrake 7.0
+ Mandriva Linux Mandrake 6.1
+ Mandriva Linux Mandrake 6.0
+ RedHat Linux 7.0 sparc
+ RedHat Linux 7.0 i386
+ RedHat Linux 7.0 alpha
+ RedHat Linux 6.2 sparc
+ RedHat Linux 6.2 i386
+ RedHat Linux 6.2 alpha
+ RedHat Linux 6.1 sparc
+ RedHat Linux 6.1 i386
+ RedHat Linux 6.1 alpha
+ RedHat Linux 6.0 sparc
+ RedHat Linux 6.0 alpha
+ RedHat Linux 6.0
+ S.u.S.E. Linux 7.0
+ S.u.S.E. Linux 6.4 ppc
+ S.u.S.E. Linux 6.4 alpha
+ S.u.S.E. Linux 6.4
+ S.u.S.E. Linux 6.3 ppc
+ S.u.S.E. Linux 6.3 alpha
+ S.u.S.E. Linux 6.3
+ S.u.S.E. Linux 6.1 alpha
+ S.u.S.E. Linux 6.1
+ S.u.S.E. Linux 6.0
+ SCO eDesktop 2.4
+ SCO eServer 2.3.1
+ Slackware Linux 7.1
+ Slackware Linux 7.0
+ Slackware Linux 4.0
+ Wirex Immunix OS 7.0 -Beta
+ Wirex Immunix OS 7.0
+ Wirex Immunix OS 6.2
Linux kernel 2.2.17
+ Mandriva Linux Mandrake 7.2
+ S.u.S.E. Linux 7.0
+ Trustix Secure Linux 1.2
Linux kernel 2.2.16 pre6
Linux kernel 2.2.16
Linux kernel 2.2.15 pre20
Linux kernel 2.2.15 pre16
Linux kernel 2.2.15
Linux kernel 2.2.14
+ Red Hat Linux 6.2
+ SCO eDesktop 2.4
+ SCO eServer 2.3.1
+ Sun Cobalt RaQ 4
Linux kernel 2.2.13
+ S.u.S.E. Linux 6.4
+ S.u.S.E. Linux 6.3
Linux kernel 2.2.12
Linux kernel 2.2.11
Linux kernel 2.2.10
Linux kernel 2.2.9
Linux kernel 2.2.8
Linux kernel 2.2.7
Linux kernel 2.2.6
Linux kernel 2.2.5
Linux kernel 2.2.4
Linux kernel 2.2.3
Linux kernel 2.2.2
Linux kernel 2.2.1
Linux kernel 2.2 .x
Linux kernel 2.2
Linux kernel 2.1.89
Linux kernel 2.1 .x
Linux kernel 2.1
Linux kernel 2.0.39
Linux kernel 2.0.38
Linux kernel 2.0.37
Linux kernel 2.0.36
Linux kernel 2.0.35
Linux kernel 2.0.34
Linux kernel 2.0.33
Linux kernel 2.0.32
Linux kernel 2.0.31
Linux kernel 2.0.30
Linux kernel 2.0.29
Linux kernel 2.0.28
Linux kernel 2.0.27
Linux kernel 2.0.26
Linux kernel 2.0.25
Linux kernel 2.0.24
Linux kernel 2.0.23
Linux kernel 2.0.22
Linux kernel 2.0.21
Linux kernel 2.0.20
Linux kernel 2.0.19
Linux kernel 2.0.18
Linux kernel 2.0.17
Linux kernel 2.0.16
Linux kernel 2.0.15
Linux kernel 2.0.14
Linux kernel 2.0.13
Linux kernel 2.0.12
Linux kernel 2.0.11
Linux kernel 2.0.10
Linux kernel 2.0.9
Linux kernel 2.0.8
Linux kernel 2.0.7
Linux kernel 2.0.6
Linux kernel 2.0.5
Linux kernel 2.0.4
Linux kernel 2.0.3
Linux kernel 2.0.2
Linux kernel 2.0.1
Linux kernel 2.0 .x
Linux kernel 2.0
Leif M. Wright simplestmail.cgi 2.2.18
Leif M. Wright simplestmail.cgi 2.0.22
Linux kernel 2.4.22
+ Devil-Linux Devil-Linux 1.0.5
+ Devil-Linux Devil-Linux 1.0.4
+ Mandriva Linux Mandrake 9.2 amd64
+ Mandriva Linux Mandrake 9.2
+ Red Hat Fedora Core1
+ Slackware Linux 9.1

- 不受影响的程序版本

Linux kernel 2.4.22
+ Devil-Linux Devil-Linux 1.0.5
+ Devil-Linux Devil-Linux 1.0.4
+ Mandriva Linux Mandrake 9.2 amd64
+ Mandriva Linux Mandrake 9.2
+ Red Hat Fedora Core1
+ Slackware Linux 9.1

- 漏洞讨论

The Linux Kernel FPU/SSE environment restoration code has been reported prone to a vulnerability that could lead to a local denial of service.

When the kernel is attempting to restore FPU/SSE state information previously stored using the FXSAVE instruction, an exceptional condition may occur that could cause the contents of the MXCSR register to be corrupted. This could potentially cause a reserved bit within the register to be unexpectedly set, effectively triggering a general protection fault to occur within the kernel, causing it to crash.

Successful exploitation of this issue could potentially allow an unprivileged attacker to crash an affected system.

- 漏洞利用

Symantec has confirmed that this issue is exploitable.

- 解决方案

Mandrake Linux have released a security advisory (MDKSA-2003:074) to address this issue. Further details regarding downloading and applying these fixes can be found in the referenced advisory. Fixes are linked below.

Mandrake has issued a kernel upgrade that is patched. Please see the advisory linked to in the reference section (MDKSA-2003:066-1) for further information.

Red Hat Linux has released an advisory RHSA-2003:187-01. Information about obtaining and applying fixes can be found in the referenced advisory.

Debian has issued a kernel upgrade that is patched. Please see the advisories linked to in the reference section (DSA-311-1 and DSA 312-1) for URLs to fixes.

Red Hat Linux has released a new advisory RHSA-2003:195-06. Fixes are available through the Red Hat Network. Affected users are advised to upgrade.

Debian has released a new advisory, DSA 332-1. Information about obtaining and applying fixes can be found in the referenced advisory.

Debian has announced in DSA 336-2 that advisory DSA 336-1 does not address this issue.

Guardian Digital has released advisory ESA-20032407-018 to address this issue. See referenced advisory for additional information.

Conectiva has released advisory CLA-2003:701 to address this issue. See referenced advisory for additional details and fix information.

This issue was officially addressed in the release of the Linux 2.4.22 kernel.

Conectiva has released a security advisory (CLA-2003:796) containing fixes to address this issue in Conectiva Linux 8.

Debian has released DSA 442-1 to provide fixes for s390 platforms. Please see the attached advisory for further information.

Fixes:


MandrakeSoft Corporate Server 2.1

Linux kernel 2.4

Linux kernel 2.4.1

Linux kernel 2.4.11

Linux kernel 2.4.12

Linux kernel 2.4.13

Linux kernel 2.4.15

Linux kernel 2.4.17

Linux kernel 2.4.21

Linux kernel 2.4.21 pre1

Linux kernel 2.4.21 pre4

Linux kernel 2.4.5

Linux kernel 2.4.6

Linux kernel 2.4.7

Mandriva Linux Mandrake 9.1

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站