CVE-2004-0075
CVSS2.1
发布时间 :2004-03-15 00:00:00
修订时间 :2008-09-05 16:37:26
NMCOS    

[原文]The Vicam USB driver in Linux before 2.4.25 does not use the copy_from_user function when copying data from userspace to kernel space, which crosses security boundaries and allows local users to cause a denial of service.


[CNNVD]Linux Kernel Vicam USB驱动用户空间/内核内存拷贝漏洞(CNNVD-200403-075)

        
        Linux是一款开放源代码操作系统。
        Linux内核Vicam USB驱动不安全访问用户空间内存,本地攻击者可以利用这个漏洞进行拒绝服务攻击,或提升权限。
        Vicam USB驱动没有使用copy_from_user函数来访问用户空间,可能导致拒绝服务攻击,或提升权限。目前没有详细漏洞细节提供。
        

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:linux:linux_kernel:2.4.1Linux Kernel 2.4.1
cpe:/o:linux:linux_kernel:2.4.17Linux Kernel 2.4.17
cpe:/o:linux:linux_kernel:2.4.14Linux Kernel 2.4.14
cpe:/o:linux:linux_kernel:2.4.10Linux Kernel 2.4.10
cpe:/o:linux:linux_kernel:2.4.18:pre5Linux Kernel 2.4.18 pre5
cpe:/o:linux:linux_kernel:2.4.24_ow1
cpe:/o:linux:linux_kernel:2.4.0:test3Linux Kernel 2.4.0 test3
cpe:/o:linux:linux_kernel:2.4.23:pre9Linux Kernel 2.4.23 pre9
cpe:/o:linux:linux_kernel:2.4.0:test7Linux Kernel 2.4.0 test7
cpe:/o:linux:linux_kernel:2.4.19:pre6Linux Kernel 2.4.19 pre6
cpe:/o:linux:linux_kernel:2.4.21:pre1Linux Kernel 2.4.21 pre1
cpe:/o:linux:linux_kernel:2.4.18:pre3Linux Kernel 2.4.18 pre3
cpe:/o:linux:linux_kernel:2.4.5Linux Kernel 2.4.5
cpe:/o:linux:linux_kernel:2.4.19:pre2Linux Kernel 2.4.19 pre2
cpe:/o:linux:linux_kernel:2.4.12Linux Kernel 2.4.12
cpe:/o:linux:linux_kernel:2.4.18::x86
cpe:/o:linux:linux_kernel:2.4.0:test8Linux Kernel 2.4.0 test8
cpe:/o:linux:linux_kernel:2.4.0:test9Linux Kernel 2.4.0 test9
cpe:/o:linux:linux_kernel:2.4.18:pre7Linux Kernel 2.4.18 pre7
cpe:/o:linux:linux_kernel:2.4.19:pre3Linux Kernel 2.4.19 pre3
cpe:/o:linux:linux_kernel:2.4.23_ow2
cpe:/o:linux:linux_kernel:2.4.2Linux Kernel 2.4.2
cpe:/o:linux:linux_kernel:2.4.3Linux Kernel 2.4.3
cpe:/o:linux:linux_kernel:2.4.0:test11Linux Kernel 2.4.0 test11
cpe:/o:linux:linux_kernel:2.4.16Linux Kernel 2.4.16
cpe:/o:linux:linux_kernel:2.4.6Linux Kernel 2.4.6
cpe:/o:linux:linux_kernel:2.4.0:test10Linux Kernel 2.4.0 test10
cpe:/o:linux:linux_kernel:2.4.23Linux Kernel 2.4.23
cpe:/o:linux:linux_kernel:2.4.24Linux Kernel 2.4.24
cpe:/o:linux:linux_kernel:2.4.7Linux Kernel 2.4.7
cpe:/o:linux:linux_kernel:2.4.0:test1Linux Kernel 2.4.0 test1
cpe:/o:linux:linux_kernel:2.4.18:pre4Linux Kernel 2.4.18 pre4
cpe:/o:linux:linux_kernel:2.4.11Linux Kernel 2.4.11
cpe:/o:linux:linux_kernel:2.4.4Linux Kernel 2.4.4
cpe:/o:linux:linux_kernel:2.4.13Linux Kernel 2.4.13
cpe:/o:linux:linux_kernel:2.4.0:test12Linux Kernel 2.4.0 test12
cpe:/o:linux:linux_kernel:2.4.18:pre8Linux Kernel 2.4.18 pre8
cpe:/o:linux:linux_kernel:2.4.0:test2Linux Kernel 2.4.0 test2
cpe:/o:linux:linux_kernel:2.4.19Linux Kernel 2.4.19
cpe:/o:linux:linux_kernel:2.4.18:pre1Linux Kernel 2.4.18 pre1
cpe:/o:linux:linux_kernel:2.4.18:pre6Linux Kernel 2.4.18 pre6
cpe:/o:linux:linux_kernel:2.4.9Linux Kernel 2.4.9
cpe:/o:linux:linux_kernel:2.4.21:pre4Linux Kernel 2.4.21 pre4
cpe:/o:linux:linux_kernel:2.4.8Linux Kernel 2.4.8
cpe:/o:linux:linux_kernel:2.4.18Linux Kernel 2.4.18
cpe:/o:linux:linux_kernel:2.4.19:pre4Linux Kernel 2.4.19 pre4
cpe:/o:linux:linux_kernel:2.4.20Linux Kernel 2.4.20
cpe:/o:linux:linux_kernel:2.4.0:test4Linux Kernel 2.4.0 test4
cpe:/o:linux:linux_kernel:2.4.0:test5Linux Kernel 2.4.0 test5
cpe:/o:linux:linux_kernel:2.4.21:pre7Linux Kernel 2.4.21 pre7
cpe:/o:linux:linux_kernel:2.4.19:pre1Linux Kernel 2.4.19 pre1
cpe:/o:linux:linux_kernel:2.4.18:pre2Linux Kernel 2.4.18 pre2
cpe:/o:linux:linux_kernel:2.4.22Linux Kernel 2.4.22
cpe:/o:linux:linux_kernel:2.4.19:pre5Linux Kernel 2.4.19 pre5
cpe:/o:linux:linux_kernel:2.4.21Linux Kernel 2.4.21
cpe:/o:linux:linux_kernel:2.4.0:test6Linux Kernel 2.4.0 test6
cpe:/o:linux:linux_kernel:2.4.15Linux Kernel 2.4.15
cpe:/o:linux:linux_kernel:2.4.0Linux Kernel 2.4.0

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:9948The Vicam USB driver in Linux before 2.4.25 does not use the copy_from_user function when copying data from userspace to kernel space, which...
oval:org.mitre.oval:def:836Vicam USB Driver Data Copy Vulnerability
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0075
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0075
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200403-075
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/9690
(VENDOR_ADVISORY)  BID  9690
http://www.redhat.com/support/errata/RHSA-2004-065.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2004:065
http://xforce.iss.net/xforce/xfdb/15246
(VENDOR_ADVISORY)  XF  linux-vicam-dos(15246)
http://www.redhat.com/support/errata/RHSA-2005-293.html
(UNKNOWN)  REDHAT  RHSA-2005:293
http://www.novell.com/linux/security/advisories/2004_05_linux_kernel.html
(UNKNOWN)  SUSE  SuSE-SA:2004:005
http://www.ciac.org/ciac/bulletins/o-082.shtml
(UNKNOWN)  CIAC  O-082
http://frontal2.mandriva.com/security/advisories?name=MDKSA-2004:015
(UNKNOWN)  MANDRAKE  MDKSA-2004:015
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846
(UNKNOWN)  CONECTIVA  CLA-2004:846

- 漏洞信息

Linux Kernel Vicam USB驱动用户空间/内核内存拷贝漏洞
低危 设计错误
2004-03-15 00:00:00 2005-05-13 00:00:00
本地  
        
        Linux是一款开放源代码操作系统。
        Linux内核Vicam USB驱动不安全访问用户空间内存,本地攻击者可以利用这个漏洞进行拒绝服务攻击,或提升权限。
        Vicam USB驱动没有使用copy_from_user函数来访问用户空间,可能导致拒绝服务攻击,或提升权限。目前没有详细漏洞细节提供。
        

- 公告与补丁

        厂商补丁:
        Linux
        -----
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        Linux Upgrade linux-2.4.25.tar.bz2
        
        http://www.kernel.org/pub/linux/kernel/v2.4/linux-2.4.25.tar.bz2

        RedHat
        ------
        RedHat已经为此发布了一个安全公告(RHSA-2004:065-01)以及相应补丁:
        RHSA-2004:065-01:Updated kernel packages resolve security vulnerabilities
        链接:https://www.redhat.com/support/errata/RHSA-2004-065.html
        补丁下载:
        Red Hat Linux 9:
        SRPMS:
        ftp://updates.redhat.com/9/en/os/SRPMS/kernel-2.4.20-30.9.src.rpm
        athlon:
        ftp://updates.redhat.com/9/en/os/athlon/kernel-2.4.20-30.9.athlon.rpm
        ftp://updates.redhat.com/9/en/os/athlon/kernel-smp-2.4.20-30.9.athlon.rpm
        i386:
        ftp://updates.redhat.com/9/en/os/i386/kernel-2.4.20-30.9.i386.rpm
        ftp://updates.redhat.com/9/en/os/i386/kernel-BOOT-2.4.20-30.9.i386.rpm
        ftp://updates.redhat.com/9/en/os/i386/kernel-doc-2.4.20-30.9.i386.rpm
        ftp://updates.redhat.com/9/en/os/i386/kernel-source-2.4.20-30.9.i386.rpm
        i686:
        ftp://updates.redhat.com/9/en/os/i686/kernel-2.4.20-30.9.i686.rpm
        ftp://updates.redhat.com/9/en/os/i686/kernel-bigmem-2.4.20-30.9.i686.rpm
        ftp://updates.redhat.com/9/en/os/i686/kernel-smp-2.4.20-30.9.i686.rpm
        可使用下列命令安装补丁:
        rpm -Fvh [文件名]
        S.u.S.E.
        --------
        S.u.S.E.已经为此发布了一个安全公告(SuSE-SA:2004:005)以及相应补丁:
        SuSE-SA:2004:005:Linux Kernel
        链接:
        补丁下载:
        SuSE Upgrade k_deflt-2.4.20-105.i586.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/k_deflt-2.4.20-105.i586.rpm
        Intel i386 Platform
        SuSE Upgrade k_athlon-2.4.20-105.i586.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/k_athlon-2.4.20-105.i586.rpm
        Intel i386 Platform
        SuSE Upgrade k_psmp-2.4.20-105.i586.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/k_psmp-2.4.20-105.i586.rpm
        Intel i386 Platform
        SuSE Upgrade k_smp-2.4.20-105.i586.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/k_smp-2.4.20-105.i586.rpm
        Intel i386 Platform
        SuSE Upgrade k_deflt-2.4.21-192.i586.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/k_deflt-2.4.21-192.i586.rpm
        Intel i386 Platform
        SuSE Upgrade k_smp-2.4.21-192.i586.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/k_smp-2.4.21-192.i586.rpm
        Intel i386 Platform
        SuSE Upgrade k_smp4G-2.4.21-192.i586.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/k_smp4G-2.4.21-192.i586.rpm
        Intel i386 Platform
        SuSE Upgrade k_um-2.4.21-192.i586.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/k_um-2.4.21-192.i586.rpm
        Intel i386 Platform
        SuSE Upgrade k_athlon-2.4.21-192.i586.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/k_athlon-2.4.21-192.i586.rpm
        Intel i386 Platform
        SuSE Upgrade k_deflt-2.4.21-189.i586.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/k_deflt-2.4.21-189.i586.rpm
        Intel i386 Platform/SuSE 8.1
        SuSE Upgrade k_athlon-2.4.21-189.i586.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/k_athlon-2.4.21-189.i586.rpm
        Intel i386 Platform/SuSE 8.1
        SuSE Upgrade k_psmp-2.4.21-189.i586.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/k_psmp-2.4.21-189.i586.rpm
        Intel i386 Platform/SuSE 8.1
        SuSE Upgrade k_smp-2.4.21-189.i586.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/k_smp-2.4.21-189.i586.rpm
        Intel i386 Platform/SuSE 8.1
        SuSE Upgrade k_deflt-2.4.21-201.x86_64.rpm
        ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/k_deflt-2.4.21-201.x86_64.rpm
        x86_64/SuSE 9.0
        SuSE Upgrade k_smp-2.4.21-201.x86_64.rpm
        ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/k_smp-2.4.21-201.x86_64.rpm
        x86_64/SuSE 9.0

- 漏洞信息

3990
Linux Kernel Vicam USB Driver Insecure Userspace Access

- 漏洞描述

Unknown or Incomplete

- 时间线

2004-02-18 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Linux Kernel Vicam USB Driver Userspace/Kernel Memory Copying Weakness
Design Error 9690
No Yes
2004-02-18 12:00:00 2009-07-12 03:06:00
This issue was announced in a Red Hat advisory.

- 受影响的程序版本

Linux kernel 2.4.24 -ow1
Linux kernel 2.4.24
Linux kernel 2.4.23 -pre9
Linux kernel 2.4.23 -ow2
Linux kernel 2.4.23
+ Trustix Secure Linux 2.0
Linux kernel 2.4.22
+ Devil-Linux Devil-Linux 1.0.5
+ Devil-Linux Devil-Linux 1.0.4
+ Mandriva Linux Mandrake 9.2 amd64
+ Mandriva Linux Mandrake 9.2
+ Red Hat Fedora Core1
+ Slackware Linux 9.1
Linux kernel 2.4.21 pre7
Linux kernel 2.4.21 pre4
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
Linux kernel 2.4.21 pre1
Linux kernel 2.4.21
+ Conectiva Linux 9.0
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
+ Red Hat Enterprise Linux AS 3
+ RedHat Desktop 3.0
+ RedHat Enterprise Linux ES 3
+ RedHat Enterprise Linux WS 3
+ S.u.S.E. Linux Personal 9.0 x86_64
+ S.u.S.E. Linux Personal 9.0
+ SuSE SUSE Linux Enterprise Server 8
Linux kernel 2.4.20
+ CRUX CRUX Linux 1.0
+ Gentoo Linux 1.4
+ Gentoo Linux 1.2
+ RedHat Linux 9.0 i386
+ Slackware Linux 9.0
+ WOLK WOLK 4.4 s
Linux kernel 2.4.19 -pre6
Linux kernel 2.4.19 -pre5
Linux kernel 2.4.19 -pre4
Linux kernel 2.4.19 -pre3
Linux kernel 2.4.19 -pre2
Linux kernel 2.4.19 -pre1
Linux kernel 2.4.19
+ Conectiva Linux 8.0
+ Conectiva Linux Enterprise Edition 1.0
+ MandrakeSoft Corporate Server 2.1 x86_64
+ MandrakeSoft Corporate Server 2.1
+ MandrakeSoft Multi Network Firewall 2.0
+ Mandriva Linux Mandrake 9.0
+ S.u.S.E. Linux 8.1
+ Slackware Linux -current
+ SuSE SUSE Linux Enterprise Server 8
+ SuSE SUSE Linux Enterprise Server 7
Linux kernel 2.4.18 pre-8
Linux kernel 2.4.18 pre-7
Linux kernel 2.4.18 pre-6
Linux kernel 2.4.18 pre-5
Linux kernel 2.4.18 pre-4
Linux kernel 2.4.18 pre-3
Linux kernel 2.4.18 pre-2
Linux kernel 2.4.18 pre-1
Linux kernel 2.4.18 x86
+ Debian Linux 3.0 ia-32
Linux kernel 2.4.18
+ Astaro Security Linux 2.0 23
+ Astaro Security Linux 2.0 16
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Mandriva Linux Mandrake 8.2
+ Mandriva Linux Mandrake 8.1
+ Mandriva Linux Mandrake 8.0
+ Red Hat Enterprise Linux AS 2.1 IA64
+ RedHat Advanced Workstation for the Itanium Processor 2.1 IA64
+ RedHat Advanced Workstation for the Itanium Processor 2.1
+ RedHat Linux 8.0
+ RedHat Linux 7.3
+ S.u.S.E. Linux 8.1
+ S.u.S.E. Linux 8.0
+ S.u.S.E. Linux 7.3
+ S.u.S.E. Linux 7.2
+ S.u.S.E. Linux 7.1
+ S.u.S.E. Linux Connectivity Server
+ S.u.S.E. Linux Database Server 0
+ S.u.S.E. Linux Firewall on CD
+ S.u.S.E. Linux Office Server
+ S.u.S.E. Linux Openexchange Server
+ S.u.S.E. Linux Personal 8.2
+ S.u.S.E. SuSE eMail Server 3.1
+ S.u.S.E. SuSE eMail Server III
+ SuSE SUSE Linux Enterprise Server 8
+ SuSE SUSE Linux Enterprise Server 7
+ Turbolinux Turbolinux Server 8.0
+ Turbolinux Turbolinux Server 7.0
+ Turbolinux Turbolinux Workstation 8.0
+ Turbolinux Turbolinux Workstation 7.0
Linux kernel 2.4.17
Linux kernel 2.4.16
+ Sun Cobalt RaQ 550
Linux kernel 2.4.15
Linux kernel 2.4.14
Linux kernel 2.4.13
+ Caldera OpenLinux Server 3.1.1
+ Caldera OpenLinux Workstation 3.1.1
Linux kernel 2.4.12
+ Conectiva Linux 7.0
Linux kernel 2.4.11
Linux kernel 2.4.10
+ S.u.S.E. Linux 7.3
Linux kernel 2.4.9
+ Red Hat Enterprise Linux AS 2.1 IA64
+ Red Hat Enterprise Linux AS 2.1
+ RedHat Enterprise Linux ES 2.1 IA64
+ RedHat Enterprise Linux ES 2.1
+ RedHat Enterprise Linux WS 2.1 IA64
+ RedHat Enterprise Linux WS 2.1
+ RedHat Linux 7.2 ia64
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.2 alpha
+ RedHat Linux 7.1 ia64
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1 alpha
+ Sun Linux 5.0.5
+ Sun Linux 5.0.3
+ Sun Linux 5.0
Linux kernel 2.4.8
+ Mandriva Linux Mandrake 8.2
+ Mandriva Linux Mandrake 8.1
+ Mandriva Linux Mandrake 8.0
Linux kernel 2.4.7
+ RedHat Linux 7.2
+ S.u.S.E. Linux 7.2
+ S.u.S.E. Linux 7.1
Linux kernel 2.4.6
Linux kernel 2.4.5
+ Slackware Linux 8.0
Linux kernel 2.4.4
+ S.u.S.E. Linux 7.2
Linux kernel 2.4.3
+ Mandriva Linux Mandrake 8.0 ppc
+ Mandriva Linux Mandrake 8.0
Linux kernel 2.4.2
+ Caldera OpenLinux Server 3.1
+ Caldera OpenLinux Workstation 3.1
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1 alpha
Linux kernel 2.4.1
Linux kernel 2.4 .0-test9
Linux kernel 2.4 .0-test8
Linux kernel 2.4 .0-test7
Linux kernel 2.4 .0-test6
Linux kernel 2.4 .0-test5
Linux kernel 2.4 .0-test4
Linux kernel 2.4 .0-test3
Linux kernel 2.4 .0-test2
Linux kernel 2.4 .0-test12
Linux kernel 2.4 .0-test11
Linux kernel 2.4 .0-test10
Linux kernel 2.4 .0-test1
Linux kernel 2.4
Conectiva Linux 9.0
Conectiva Linux 8.0
Linux kernel 2.4.25

- 不受影响的程序版本

Linux kernel 2.4.25

- 漏洞讨论

It has been reported that the Vicam USB driver does not access userspace memory in a safe manner. This is reported to present unspecified local security risks.

This issue is reported to exist in kernel versions prior to 2.4.25.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Conectiva has released advisory CLA-2004:846 to provide Kernel updates to address this and other issues for Conectiva 8 and 9. Please see the referenced advisory for further details regarding obtaining and applying appropriate updates.

Mandrake has released an advisory (MDKSA-2004:015) with fixes to address this issue. Please see the referenced advisory for more information.

Red Hat has released an advisory RHSA-2004:065-01 with fixes to address
this issue. Please see the referenced advisory for more information.

SuSE has released advisory SA:2004:005 dealing with this issue. Please see the referenced advisory for more information.

This issue has also reportedly been addressed in version 2.4.25 of the kernel.

Mandrake has released an updated advisory MDKSA-2004:015-1 to address this and other issues. Please see the referenced advisory for more information.

Fedora has released legacy advisory update FLSA:1284 fixing this issue in Red Hat linux 7.2, 7.3 and 8.0 for the i386, i586, i686 and athlon architectures. Please see the referenced advisory for details.

Red Hat released advisory RHSA-2005:293-16 as well as fixes to address this and other issues on Red Hat Linux Enterprise platforms. Customers who are affected by this issue are advised to apply the appropriate updates. Customers subscribed to the Red Hat Network may apply the appropriate fixes using the Red Hat Update Agent (up2date). Please see referenced advisories for additional information.


Linux kernel 2.4

Linux kernel 2.4 .0-test2

Linux kernel 2.4 .0-test3

Linux kernel 2.4 .0-test6

Linux kernel 2.4 .0-test11

Linux kernel 2.4 .0-test10

Linux kernel 2.4 .0-test4

Linux kernel 2.4 .0-test1

Linux kernel 2.4 .0-test5

Linux kernel 2.4 .0-test12

Linux kernel 2.4 .0-test8

Linux kernel 2.4 .0-test7

Linux kernel 2.4 .0-test9

Linux kernel 2.4.1

Linux kernel 2.4.10

Linux kernel 2.4.11

Linux kernel 2.4.12

Linux kernel 2.4.13

Linux kernel 2.4.14

Linux kernel 2.4.15

Linux kernel 2.4.16

Linux kernel 2.4.17

Linux kernel 2.4.18 pre-3

Linux kernel 2.4.18 pre-2

Linux kernel 2.4.18 pre-4

Linux kernel 2.4.18 pre-8

Linux kernel 2.4.18 pre-7

Linux kernel 2.4.18

Linux kernel 2.4.18 pre-5

Linux kernel 2.4.18 x86

Linux kernel 2.4.18 pre-1

Linux kernel 2.4.18 pre-6

Linux kernel 2.4.19 -pre1

Linux kernel 2.4.19 -pre6

Linux kernel 2.4.19 -pre2

Linux kernel 2.4.19

Linux kernel 2.4.19 -pre5

Linux kernel 2.4.19 -pre3

Linux kernel 2.4.19 -pre4

Linux kernel 2.4.2

Linux kernel 2.4.20

Linux kernel 2.4.21 pre1

Linux kernel 2.4.21 pre4

Linux kernel 2.4.21

Linux kernel 2.4.21 pre7

Linux kernel 2.4.22

Linux kernel 2.4.23 -ow2

Linux kernel 2.4.23 -pre9

Linux kernel 2.4.23

Linux kernel 2.4.24

Linux kernel 2.4.24 -ow1

Linux kernel 2.4.3

Linux kernel 2.4.4

Linux kernel 2.4.5

Linux kernel 2.4.6

Linux kernel 2.4.7

Linux kernel 2.4.8

Linux kernel 2.4.9

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站