Linux kernel'ip6_flowlabel.c'的ip6fl_get_n函数本地拒绝服务漏洞

admin 2022-07-22 23:14:16 CNNVD漏洞 来源:ZONE.CI 全球网 0 阅读模式

漏洞信息详情

Linux kernel'ip6_flowlabel.c'的ip6fl_get_n函数本地拒绝服务漏洞

  • CNNVD编号:CNNVD-200610-530
  • 危害等级: 低危
  • CVE编号: CVE-2006-5619
  • 漏洞类型: 资源管理错误
  • 发布时间: 2006-10-31
  • 威胁类型: 本地
  • 更新时间: 2006-11-02
  • 厂        商: linux
  • 漏洞来源: This issue was dis...

漏洞简介

Linux kernel 2.6至2.6.18-stable的seqfile handling (ip6_flowlabel.c的ip6fl_get_n函数)允许本地用户通过不明的控制(搜索流标签时触发无限循环),引起拒绝服务(挂起或中断)攻击。

漏洞公告

目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:

Linux kernel 2.6.17

Ubuntu affs-modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu 6.10:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/affs -modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu affs-modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu 6.10:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/affs -modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu cdrom-core-modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu 6.10:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdro m-core-modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu cdrom-core-modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu 6.10:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdro m-core-modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu cdrom-core-modules-2.6.17-10-sparc64-di_2.6.17.1-10.34_sparc.udeb

Ubuntu 6.10:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdro m-core-modules-2.6.17-10-sparc64-di_2.6.17.1-10.34_sparc.udeb

Ubuntu crc-modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu 6.10:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/crc- modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu crc-modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu 6.10:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/crc- modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu crc-modules-2.6.17-10-sparc64-di_2.6.17.1-10.34_sparc.udeb

Ubuntu 6.10:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/crc- modules-2.6.17-10-sparc64-di_2.6.17.1-10.34_sparc.udeb

Ubuntu ext2-modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu 6.10:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext2 -modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu ext2-modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu 6.10:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext2 -modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu ext2-modules-2.6.17-10-sparc64-di_2.6.17.1-10.34_sparc.udeb

Ubuntu 6.10:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext2 -modules-2.6.17-10-sparc64-di_2.6.17.1-10.34_sparc.udeb

Ubuntu ext3-modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu 6.10:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext3 -modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu ext3-modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu 6.10:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext3 -modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu ext3-modules-2.6.17-10-sparc64-di_2.6.17.1-10.34_sparc.udeb

Ubuntu 6.10:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext3 -modules-2.6.17-10-sparc64-di_2.6.17.1-10.34_sparc.udeb

Ubuntu fat-modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu 6.10:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fat- modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu fb-modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu 6.10:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fb-m odules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu fb-modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu 6.10:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fb-m odules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu firewire-core-modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu 6.10:

http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fire wire-core-modules-2.6.17-10-powerpc-di_2.6.17.1-10.34_powerpc.udeb

Ubuntu firewire-core-modules-2.6.17-10-powerpc64-smp-di_2.6.17.1-10.34_powerpc.udeb

参考网址

来源: www.kernel.org

链接:http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bcd620757d3a4ae78ef0ca41adb5d9e400ed92b6

来源: issues.rpath.com

链接:https://issues.rpath.com/browse/RPL-760

来源: XF

名称: kernel-seqfile-ipv6-dos(29970)

链接:http://xforce.iss.net/xforce/xfdb/29970

来源: DEBIAN

名称: DSA-1233

链接:http://www.us.debian.org/security/2006/dsa-1233

来源: UBUNTU

名称: USN-395-1

链接:http://www.ubuntu.com/usn/usn-395-1

来源: BID

名称: 20847

链接:http://www.securityfocus.com/bid/20847

来源: BUGTRAQ

名称: 20061109 rPSA-2006-0204-1 kernel

链接:http://www.securityfocus.com/archive/1/archive/1/451097/100/0/threaded

来源: SUSE

名称: SUSE-SA:2006:079

链接:http://www.novell.com/linux/security/advisories/2006_79_kernel.HTML

来源: MANDRIVA

名称: MDKSA-2007:025

链接:http://www.mandriva.com/security/advisories?name=MDKSA-2007:025

来源: MANDRIVA

名称: MDKSA-2007:012

链接:http://www.mandriva.com/security/advisories?name=MDKSA-2007:012

来源: MANDRIVA

名称: MDKSA-2007:002

链接:http://www.mandriva.com/security/advisories?name=MDKSA-2007:002

来源: VUPEN

名称: ADV-2006-4297

链接:http://www.frsirt.com/english/advisories/2006/4297

来源: support.avaya.com

链接:http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm

来源: SECUNIA

名称: 24206

链接:http://secunia.com/advisories/24206

来源: SECUNIA

名称: 23997

链接:http://secunia.com/advisories/23997

来源: SECUNIA

名称: 23752

链接:http://secunia.com/advisories/23752

来源: SECUNIA

名称: 23593

链接:http://secunia.com/advisories/23593

来源: SECUNIA

名称: 23474

链接:http://secunia.com/advisories/23474

来源: SECUNIA

名称: 23384

链接:http://secunia.com/advisories/23384

来源: SECUNIA

名称: 23370

链接:http://secunia.com/advisories/23370

来源: SECUNIA

名称: 22754

链接:http://secunia.com/advisories/22754

来源: SECUNIA

名称: 22665

链接:http://secunia.com/advisories/22665

来源: REDHAT

名称: RHSA-2007:0014

链接:http://rhn.redhat.com/errata/RHSA-2007-0014.HTML

来源: MLIST

名称: [linux-kernel] 20061105 Linux 2.6.16.31-rc1

链接:http://lkml.org/lkml/2006/11/5/46

来源: issues.rpath.com

链接:http://issues.rpath.com/browse/RPL-760

来源: MANDRIVA

名称: MDKSA-2007:025

链接:http://frontal2.mandriva.com/security/advisories?name=MDKSA-2007:025

来源: MANDRIVA

名称: MDKSA-2007:012

链接:http://frontal2.mandriva.com/security/advisories?name=MDKSA-2007:012

受影响实体

  • Linux Linux_kernel:2.6.16.32  
  • Linux Linux_kernel:2.6.16.27  
  • Linux Linux_kernel:2.6.16.28  
  • Linux Linux_kernel:2.6.9:Rc3  
  • Linux Linux_kernel:2.6.16.30  

补丁

    暂无

weinxin
特别声明
本站(ZONE.CI)所有文章仅供技术研究,若将其信息做其他用途,由用户承担全部法律及连带责任,本站不承担任何法律及连带责任,请遵守中华人民共和国安全法.
评论:0   参与:  0