Linux内核曝危急漏洞

系统安装、升级讨论
版面规则
我们都知道新人的确很菜,也喜欢抱怨,并且带有浓厚的Windows习惯,但既然在这里询问,我们就应该有责任帮助他们解决问题,而不是直接泼冷水、简单的否定或发表对解决问题没有任何帮助的帖子。乐于分享,以人为本,这正是Ubuntu的精神所在。
回复
头像
limoral
帖子: 22
注册时间: 2007-08-09 19:09
联系:

Linux内核曝危急漏洞

#1

帖子 limoral » 2008-02-18 22:33

来自Secunia的安全人员已经发现了Linux内核中的“危急”等级安全缺陷,这一版本的Linux内核被大量的分发套件所用。

该缺陷包含三个bug,可让未经授权的用户读取或写入内核内存位置或访问某些资源,攻击者可以利用该漏洞制造拒绝服务攻击,泄露保密信息甚至获得root权限。


Three bugs allow unauthorized users to read or write to kernel memory locations or to access certain resources in certain servers.

该缺陷影响所有版本的Linux内核 2.6.24.1,其中一个还打了补丁仍不奏效,其中应用该内核的分发套件包含Ubuntu, Turbolinux, SuSE, Red Hat, Mandriva, Debian等,几乎涵盖了绝大多数Linux分发产品。

本文不掺杂本人对Linux的感情,只是给大家提醒注意。文章来源:http://www.linuxworld.com.au/index.php/id;1548652033

--------------------------------------------------------------------------------------------------------------------------------

'Critical' Linux kernel bugs discovered

Security researchers have uncovered "critical" security flaws in a version of the Linux kernel used by a large number of popular distributions.

The three bugs allow unauthorized users to read or write to kernel memory locations or to access certain resources in certain servers, according to a SecurityFocus advisory.

They could be exploited by malicious, local users to cause denial of service attacks, disclose potentially sensitive information or gain "root" privileges, according to security experts.

The bug affects all versions of the Linux kernel up to version 2.6.24.1, which contains a patch. Distributions such as Ubuntu, Turbolinux, SuSE, Red Hat, Mandriva, Debian and others are affected.

The problems are within three functions in the system call fs/splice.c, according to an advisory from Secunia.

"In the 2.6.23 kernel the system call functionality has been further extended resulting in... critical vulnerabilities," said iSEC Security Research in an advisory.

Secunia disagreed about the bugs' seriousness, giving them a less critical ranking.

Exploit code for the vulnerabilities has been released publicly on the hacker site milw0rm.com, and Core Security Technologies has also developed a commercial exploit for the bugs, researchers said.

Researchers advised system administrators to update their kernels immediately.

Last month, a US Department of Homeland Security (DHS) bug-fixing scheme uncovered an average of one security glitch per 1,000 lines of code in 180 widely used open source software projects.

Secunia also previously discovered that the number of security bugs in open source Red Hat Linux operating system and Firefox browsers, far outstripped comparable products from Microsoft last year.
那端时事杂志:http://www.naduan.com
头像
momova
帖子: 3381
注册时间: 2007-07-11 21:43
系统: archlinux
来自: 东江边

#2

帖子 momova » 2008-02-18 22:54

了解了。
我来了,我看见了,我征服了!
求勾搭,不管饭。
头像
cloudy
帖子: 60
注册时间: 2008-02-04 14:09
来自: 云南昆明

不是吧

#3

帖子 cloudy » 2008-02-18 23:09

不上网就应该没事了哈?
junglej
帖子: 162
注册时间: 2007-09-08 14:25

#4

帖子 junglej » 2008-02-19 11:42

2.6.24.1 既然是1 ,大多数人都不会用到的
DSYin2007
帖子: 131
注册时间: 2007-09-19 13:48

#5

帖子 DSYin2007 » 2008-02-19 11:55

头像
bones7456
帖子: 8495
注册时间: 2006-04-12 20:05
来自: 杭州
联系:

#6

帖子 bones7456 » 2008-02-19 11:58

ubuntu已经修复了.
关注我的blog: ε==3
zwhuang
帖子: 157
注册时间: 2007-01-21 14:04

#7

帖子 zwhuang » 2008-02-19 13:04

bones7456 写了:ubuntu已经修复了.
确实,
$ uname -a
Linux zwhuang 2.6.24-8-generic #1 SMP Thu Feb 14 20:40:45 UTC 2008 i686 GNU/Linux

不再崩到 root 了。在 2.6.24-5 的时候还会崩到 root 的,@@
头像
BigSnake.NET
帖子: 12522
注册时间: 2006-07-02 11:16
来自: 廣州
联系:

#8

帖子 BigSnake.NET » 2008-02-19 13:04

up to version 2.6.24.1


2.6.24.1 与之前的
^_^ ~~~
要理解递归,首先要理解递归。

地球人都知道,理论上,理论跟实际是没有差别的,但实际上,理论跟实际的差别是相当大滴。
头像
yiding_he
帖子: 2677
注册时间: 2006-10-25 18:10
来自: 长沙
联系:

#9

帖子 yiding_he » 2008-02-19 13:54

13号左右不是更新了一下内核吗,说不定就是这个补丁。
你是自由的。别人也是。
头像
skyx
论坛版主
帖子: 9202
注册时间: 2006-12-23 13:46
来自: Azores Islands
联系:

Re: Linux内核曝危急漏洞

#10

帖子 skyx » 2008-02-19 14:10

limoral 写了:

该缺陷影响所有版本的Linux内核 2.6.24.1,其中一个还打了补丁仍不奏效,其中应用该内核的分发套件包含Ubuntu, Turbolinux, SuSE, Red Hat, Mandriva, Debian等,几乎涵盖了绝大多数Linux分发产品。


英文原文是:
The bug affects all versions of the Linux kernel up to version 2.6.24.1, which contains a patch. Distributions such as Ubuntu, Turbolinux, SuSE, Red Hat, Mandriva, Debian and others are affected.
楼主把红色部分翻译得实在是太变味了。

如果这正好是cet-4考试的阅读理解,#$$#@!@#%^&
no security measure is worth anything if an attacker has physical access to the machine
头像
skyx
论坛版主
帖子: 9202
注册时间: 2006-12-23 13:46
来自: Azores Islands
联系:

#11

帖子 skyx » 2008-02-19 14:23

RETIRED: Linux Kernel Multiple Prior to 2.6.24.1 Multiple Memory Access Vulnerabilities

The Linux kernel is prone to multiple memory access vulnerabilities, including:

- A vulnerability that allows unauthorized users to read arbitrary memory locations.
- A vulnerability that allows unauthorized users to write to arbitrary memory locations.
- A vulnerability that allows local attackers to access resources in certain vservers.

An attacker can exploit these issues to read and write to arbitrary memory locations on the affected computer.

This issue affects versions prior to Linux Kernel 2.6.24.1.

NOTE: This BID is being retired because each of the issues covered in this BID are now being tracked separately by the following BIDs:

27796 Linux Kernel Prior to 2.6.24.1 'copy_from_user_mmap_sem()' Memory Access Vulnerability
27798 Linux Kernel Prior to 2.6.24.1 '/proc' Local Memory Access Vulnerability
27799 Linux Kernel Prior to 2.6.24.1 'vmsplice_to_user()' Local Memory Access Vulnerability
27801 Linux Kernel Prior to 2.6.24.1 'vmsplice_to_pipe()' Local Privilege Escalation Vulnerability
no security measure is worth anything if an attacker has physical access to the machine
头像
boydd
帖子: 255
注册时间: 2007-05-10 19:42
来自: 南京, Deutschland, Karlsruhe
联系:

#12

帖子 boydd » 2008-02-20 18:59

这个bug很致命,已经测试过了
请大家务必升级
回复