Linux Kernel PROC文件系统本地权限提升漏洞 -电脑资料

时间:2012-02-05 05:33:42
染雾
分享
WORD下载 PDF下载 投诉

受影响系统:Linux kernel < 2.6.17.5不受影响系统:Linux kernel 2.6.17.5描述:


BUGTRAQID: 18992

CVE(CAN) ID: CVE-2006-3626

Linux Kernel是开发源码操作系统Linux所使用的内核,

Linux Kernel PROC文件系统本地权限提升漏洞

Linux Kernel的proc文件系统中存在竞争条件错误,本地攻击者可能利用此漏洞获取root用户权限。

这是一个0day攻击,目前正在被积极的利用。

<*来源:h00lyshit (h00lyshit@yahoo.ie)

链接:http://marc.theaimsgroup.com/?l=full-disclosure&m=115290935923500&w=2

http://www.debian.org/security/2005/dsa-1111

*>

建议:


厂商补丁:

Debian

------

Debian已经为此发布了一个安全公告(DSA-1111-1)以及相应补丁:

DSA-1111-1:New Linux kernel 2.6.8 packages fix privilege escalation

链接:http://www.debian.org/security/2005/dsa-1111

补丁下载:

Source archives:

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge4.dsc

Size/MD5 checksum:812 ff4792fd28cadb6774ae4310ce38e301

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge4.tar.gz

Size/MD5 checksum:38839 e4d527c319269df165cc23fd6fb54a68

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge4.dsc

Size/MD5 checksum:1103 7dc33f6d9079af9d79b05d6ece3dfdc5

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge4.tar.gz

Size/MD5 checksum:75714 264ee72864b022045cc4b0820fe062db

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge4.dsc

Size/MD5 checksum:1191 0fb79cfacfc5581263710440357ed5ce

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge4.tar.gz

Size/MD5 checksum:64204 02b5b536eebb207995ef3a754de1c87e

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge4.dsc

Size/MD5 checksum:1047 62f42ea9f118d911a8f215af2f3e586d

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge4.tar.gz

Size/MD5 checksum:90861 885cb72bd69153dcd6512db147caa173

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge4.dsc

Size/MD5 checksum:1036 00d330ff015d713c4652ea05c5555f91

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge4.tar.gz

Size/MD5 checksum:24447 393b640388a78dd98c727a08f972214c

http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge4.dsc

Size/MD5 checksum:1002 bca4e80e8a10ba3c0884e3fab032772b

http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge4.diff.gz

Size/MD5 checksum:1044761 b6675f6ac09f5d31f780650798c5609c

http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8.orig.tar.gz

Size/MD5 checksum: 43929719 0393c05ffa4770c3c5178b74dc7a4282

http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge4.dsc

Size/MD5 checksum:1071 4bb132bef3f8f2a220ad9e74ab76500e

http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge4.tar.gz

Size/MD5 checksum:27031 59fb7f129abc85794829e1e777b540a0

Architecture independent components:

http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge4_all.deb

Size/MD5 checksum:6183402 a4efe296e5fd14d33c6b1ae1f40265c3

http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge4_all.deb

Size/MD5 checksum:1081512 562d408fa5cd936f557eceb74621bff2

http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge4_all.deb

Size/MD5 checksum: 34943124 7b65a57ca6a2376d8042143244b8f5ab

http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge4_all.deb

Size/MD5 checksum:35134 80f1a94b1542bf3f89bd77d0a69c67c4

Alpha architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3_2.6.8-16sarge4_alpha.deb

Size/MD5 checksum:2759858 310b0ddfee56412d0fdf827fbb53ad04

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-generic_2.6.8-16sarge4_alpha.deb

Size/MD5 checksum:232256 264fb1d8c9107950918e02b3c8d1b2c5

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-smp_2.6.8-16sarge4_alpha.deb

Size/MD5 checksum:227366 3c43da6bd0a369e67be02af8e3498d60

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-generic_2.6.8-16sarge4_alpha.deb

Size/MD5 checksum: 20220764 714e37e85c5387ef44ef8ca96608934a

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-smp_2.6.8-16sarge4_alpha.deb

Size/MD5 checksum: 20073926 24005f33bb551a3dec6cdbbdae45efdf

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12_2.6.8-16sarge4_i386.deb

Size/MD5 checksum:2722664 c435fecd5d9cbda8f337c3cd86fc0dca

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-generic_2.6.8-16sarge4_i386.deb

Size/MD5 checksum:226110 94d5814aed329864cad5d1584a5d44e2

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8_2.6.8-16sarge4_i386.deb

Size/MD5 checksum:225244 d8128cc1a753402d41ce2b7ddcee875a

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8-smp_2.6.8-16sarge4_i386.deb

Size/MD5 checksum:221102 76161094b4af81690b489010912ad94d

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4_2.6.8-16sarge4_i386.deb

Size/MD5 checksum:223202 89d8a6a610eccf151bdbd38f7467731c

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4-smp_2.6.8-16sarge4_i386.deb

Size/MD5 checksum:219462 9eb4bace25ae262ac51c45617661f3be

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-generic_2.6.8-16sarge4_i386.deb

Size/MD5 checksum: 12561704 c3ffffed8671d53630c176618d12fbc9

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8_2.6.8-16sarge4_i386.deb

Size/MD5 checksum: 13257210 a4d1fac79a380edbe4284659428f7623

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8-smp_2.6.8-16sarge4_i386.deb

Size/MD5 checksum: 13219086 a578d5400499044678959c16e8839153

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4_2.6.8-16sarge4_i386.deb

Size/MD5 checksum: 13217374 1b4965fe7b97de4e24075ea3541a21fd

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4-smp_2.6.8-16sarge4_i386.deb

Size/MD5 checksum: 13190288 417cafc0fc4dd74032fc9f184ecb8659

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3_2.6.8-16sarge4_i386.deb

Size/MD5 checksum:2779472 3c3d561576b2bbcae74806518f2d526f

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-386_2.6.8-16sarge4_i386.deb

Size/MD5 checksum:258572 b6ef0ead4cbbd2f4700613fae13ecad6

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686_2.6.8-16sarge4_i386.deb

Size/MD5 checksum:256372 3bcb4f79630757e495377f140c055c5a

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686-smp_2.6.8-16sarge4_i386.deb

Size/MD5 checksum:253422 fd1d4a2ff14ea852098b41435a8dd8f2

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7_2.6.8-16sarge4_i386.deb

Size/MD5 checksum:256716 9369c6b0c81fe61fe0640fbbb5d295a3

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7-smp_2.6.8-16sarge4_i386.deb

Size/MD5 checksum:253512 027cb58c47a72a2fb0303d98988e5ec0

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-386_2.6.8-16sarge4_i386.deb

Size/MD5 checksum: 14063498 847b68ff55485cd1cfdef9b951a27639

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686_2.6.8-16sarge4_i386.deb

Size/MD5 checksum: 15536232 d3974ee45e891069362eed6af842bcfd

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686-smp_2.6.8-16sarge4_i386.deb

Size/MD5 checksum: 15346658 a52d56df265fe38bb822e3a09ce627e4

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7_2.6.8-16sarge4_i386.deb

Size/MD5 checksum: 15261024 8e67b0d239fc9ca47db18ed49b42a083

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7-smp_2.6.8-16sarge4_i386.deb

Size/MD5 checksum: 15124402 16d13d0ef23a03258fdca8dffeae8cc6

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium_2.6.8-14sarge4_ia64.deb

Size/MD5 checksum:6678 75fdf84848419b73b504cf440bb89030

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium-smp_2.6.8-14sarge4_ia64.deb

Size/MD5 checksum:6750 0583066225780439bc152d5067de73fd

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley_2.6.8-14sarge4_ia64.deb

Size/MD5 checksum:6706 b9daa129196ea166ccfdd1bfc5528aae

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-14sarge4_ia64.deb

Size/MD5 checksum:6776 816a81ea2af11666807310e001413ca2

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3_2.6.8-14sarge4_ia64.deb

Size/MD5 checksum:3098892 53c416f0b21d13d97b9cafdaf53335fe

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium_2.6.8-14sarge4_ia64.deb

Size/MD5 checksum:200088 a13df28d82aea874f7f2f7624964a180

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium-smp_2.6.8-14sarge4_ia64.deb

Size/MD5 checksum:199418 0c89142d3f9bd9dc9bc0945c2c5a5252

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley_2.6.8-14sarge4_ia64.deb

Size/MD5 checksum:199864 1627d34ecce889ab7feeb079e5e786a5

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley-smp_2.6.8-14sarge4_ia64.deb

Size/MD5 checksum:199352 1f8fbb0f499928da9afad963240a2a5a

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium_2.6.8-14sarge4_ia64.deb

Size/MD5 checksum:6676 863e6dbb301810732ca5b967d1348b1d

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium-smp_2.6.8-14sarge4_ia64.deb

Size/MD5 checksum:6750 a0be1dbee3890815491446c70292af6b

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley_2.6.8-14sarge4_ia64.deb

Size/MD5 checksum:6702 55fe56f2f3de36221c8c00826e6eca6c

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley-smp_2.6.8-14sarge4_ia64.deb

Size/MD5 checksum:6774 b00877ca52331c964323b12056cd1f70

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium_2.6.8-14sarge4_ia64.deb

Size/MD5 checksum: 21476370 c9a52f35220d0e3bc61b1f507b7dc716

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium-smp_2.6.8-14sarge4_ia64.deb

Size/MD5 checksum: 22136612 9d6f06b3203fec64ef280bb2147b60ae

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley_2.6.8-14sarge4_ia64.deb

Size/MD5 checksum: 21409268 2a5e1b20baa1a668304e4c6c0ee96f77

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley-smp_2.6.8-14sarge4_ia64.deb

Size/MD5 checksum: 22154522 dd8e2bab100e8447434428d8c3d0cd33

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-3_2.6.8-15sarge4_sparc.deb

Size/MD5 checksum:5270 d9d8a08c7d95af660ddb27b2bdf3edb2

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3_2.6.8-15sarge4_sparc.deb

Size/MD5 checksum:2890614 25a5f93a494d583f533d8a8b6afc5811

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc32_2.6.8-15sarge4_sparc.deb

Size/MD5 checksum:110050 ef8055368116c6de685e2e5fb3eb7bc9

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64_2.6.8-15sarge4_sparc.deb

Size/MD5 checksum:144772 3c49e410afa9020cfb0ed6e7daa1197a

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64-smp_2.6.8-15sarge4_sparc.deb

Size/MD5 checksum:145386 b5f7c0add8b7f5709235a9a3108b0752

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc32_2.6.8-15sarge4_sparc.deb

Size/MD5 checksum:4551130 87c9d50a7693e0f049ee47e32e1b07ff

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64_2.6.8-15sarge4_sparc.deb

Size/MD5 checksum:7430922 eceb79d6f7dd483ce5188e7934d1c506

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64-smp_2.6.8-15sarge4_sparc.deb

Size/MD5 checksum:7628714 3a3dddddba19f112f7b3b93ba5d44642

PowerPC architecture:

http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3_2.6.8-12sarge4_powerpc.deb

Size/MD5 checksum:407398 e05e6f4cc9db78fb380752ffbdeb5da8

http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3-smp_2.6.8-12sarge4_powerpc.deb

Size/MD5 checksum:407328 e8a001c81e071b8e20ae1c231a4c6995

http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4_2.6.8-12sarge4_powerpc.deb

Size/MD5 checksum:406710 77a65238ea24808cffd01963a1fc1f63

http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4-smp_2.6.8-12sarge4_powerpc.deb

Size/MD5 checksum:406636 bbc4a48430c0b9b8e65adb9acb8d7898

http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc_2.6.8-12sarge4_powerpc.deb

Size/MD5 checksum:407600 1369ada43ac7d75f21463e4d2f1c2f24

http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc-smp_2.6.8-12sarge4_powerpc.deb

Size/MD5 checksum:406756 958b261e91d96f980704c0f3f82b8e6a

http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8-3_2.6.8-12sarge4_powerpc.deb

Size/MD5 checksum:5147646 bf6d33036a5a150d791b09e021154206

http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3_2.6.8-12sarge4_powerpc.deb

Size/MD5 checksum: 13576992 151c64d944a5ba0f812596ec3c0d87c2

http://se

curity.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3-smp_2.6.8-12sarge4_powerpc.deb

Size/MD5 checksum: 13929732 a53f72b2554445b5753b905b5306bb90

http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4_2.6.8-12sarge4_powerpc.deb

Size/MD5 checksum: 13560758 ba215f514c5707a0eade2cc11f2bb0ff

http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4-smp_2.6.8-12sarge4_powerpc.deb

Size/MD5 checksum: 13921224 0fab2af9083ebfc6d70d09c1d35affc2

http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc_2.6.8-12sarge4_powerpc.deb

Size/MD5 checksum: 13595362 6dc1b4542ce1738258d3529900c16b5d

http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc-smp_2.6.8-12sarge4_powerpc.deb

Size/MD5 checksum: 13847816 9f0c9b62f6ef32fc3c16263db5a6c988

补丁安装方法:

1. 手工安装补丁包:

首先,使用下面的命令来下载补丁软件:

# wget url(url是补丁下载链接地址)

然后,使用下面的命令来安装补丁:

# dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

首先,使用下面的命令更新内部数据库:

# apt-get update

然后,使用下面的命令安装更新软件包:

# apt-get upgrade

Linux

-----

目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://www.kernel.org/pub/linux/kernel/v2.6/linux-2.6.17.5.tar.bz2

Top