Linux kernel 缓冲区错误漏洞

admin 2024-01-14 00:49:41 YS 来源:ZONE.CI 全球网 0 阅读模式
> Linux kernel 缓冲区错误漏洞

Linux kernel 缓冲区错误漏洞

CNNVD-ID编号 CNNVD-201912-566 CVE编号 CVE-2019-19332
发布时间 2019-12-11 更新时间 2021-01-29
漏洞类型 缓冲区错误 漏洞来源 Ubuntu,Red Hat,Slackware Security Team
危险等级 中危 威胁类型 本地
厂商 N/A

漏洞介绍

Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。

Linux kernel 3.13至5.4版本中存在缓冲区错误漏洞。该漏洞源于网络系统或产品在内存上执行操作时,未正确验证数据边界,导致向关联的其他内存位置上执行了错误的读写操作。攻击者可利用该漏洞导致缓冲区溢出或堆溢出等。

漏洞补丁

目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页:

参考网址

来源:MLIST

链接:https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html

来源:MISC

链接:https://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19332

来源:MLIST

链接:https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html

来源:www.openwall.com

链接:https://www.openwall.com/lists/oss-security/2019/12/16/1

来源:UBUNTU

链接:https://usn.ubuntu.com/4258-1/

来源:CONFIRM

链接:https://security.netapp.com/advisory/ntap-20200204-0002/

来源:UBUNTU

链接:https://usn.ubuntu.com/4284-1/

来源:MISC

链接:https://lore.kernel.org/kvm/[email protected]/

来源:UBUNTU

链接:https://usn.ubuntu.com/4254-2/

来源:UBUNTU

链接:https://usn.ubuntu.com/4254-1/

来源:UBUNTU

链接:https://usn.ubuntu.com/4287-2/

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html

来源:UBUNTU

链接:https://usn.ubuntu.com/4287-1/

来源:lists.debian.org

链接:https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4287-2/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4287-1/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4286-2/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4286-1/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4285-1/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4284-1/

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193381-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4255-2/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4253-2/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4254-2/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4258-1/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4254-1/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4255-1/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4253-1/

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193389-1.html

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/156427/Ubuntu-Security-Notice-USN-4287-2.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.3888/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0719/

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/Linux-kernel-buffer-overflow-via-KVM-GET-EMULATED-CPUID-31122

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/159814/Red-Hat-Security-Advisory-2020-4431-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0305/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4793/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0572.2/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0851/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1745.2/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0830/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0797/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2021.0319/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0200/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/156125/Ubuntu-Security-Notice-USN-4258-1.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0772/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0006/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0572/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0141/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1745/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.3346/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/159380/Red-Hat-Security-Advisory-2020-4060-01.html

受影响实体

暂无

信息来源

http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201912-566

weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  0