Linux kernel输入验证错误漏洞

admin 2023-12-01 13:33:00 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
低危 Linux kernel输入验证错误漏洞

CVE编号

CVE-2021-33909

利用情况

POC 已公开

补丁情况

官方补丁

披露时间

2021-07-21
漏洞描述
Linux kernel是美国Linux美国基金会的开源操作系统Linux所使用的内核。它存在输入验证错误漏洞,该漏洞源于一个越界写入的缺陷。
解决建议
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
参考链接
http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Fil...
http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice...
http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice...
http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice...
http://www.openwall.com/lists/oss-security/2021/07/22/7
http://www.openwall.com/lists/oss-security/2021/08/25/10
http://www.openwall.com/lists/oss-security/2021/09/17/2
http://www.openwall.com/lists/oss-security/2021/09/17/4
http://www.openwall.com/lists/oss-security/2021/09/21/1
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b
https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/[email protected]...
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015
https://security.netapp.com/advisory/ntap-20210819-0004/
https://www.debian.org/security/2021/dsa-4941
https://www.openwall.com/lists/oss-security/2021/07/20/1
https://www.oracle.com/security-alerts/cpujan2022.html
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 alibaba_cloud_linux_2.1903 kernel * Up to (excluding) 1.0-20210722175726.al7
运行在以下环境
系统 amazon_2 kernel * Up to (excluding) 1.0-3.amzn2
运行在以下环境
系统 amazon_AMI kernel * Up to (excluding) 4.14.238-125.422.amzn1
运行在以下环境
系统 anolis_os_7 kernel * Up to (excluding) 4.19
运行在以下环境
系统 anolis_os_8 kernel * Up to (excluding) 4.18
运行在以下环境
系统 anolis_os_8.2 kernel * Up to (excluding) 4.18.0-193.60.2
运行在以下环境
系统 centos_7 kpatch-patch * Up to (excluding) 3.10.0-1160.36.2.el7
运行在以下环境
系统 centos_8 kpatch-patch * Up to (excluding) 4.18.0-305.10.2.el8_4
运行在以下环境
系统 debian debian_linux 10.0 -
运行在以下环境
系统 debian debian_linux 9.0 -
运行在以下环境
系统 debian_10 linux * Up to (excluding) 4.19.194-3
运行在以下环境
系统 debian_11 linux * Up to (excluding) 5.10.46-2
运行在以下环境
系统 debian_12 linux * Up to (excluding) 5.10.46-2
运行在以下环境
系统 debian_9 linux * Up to (excluding) 4.9.272-2
运行在以下环境
系统 debian_sid linux * Up to (excluding) 5.10.46-2
运行在以下环境
系统 fedoraproject fedora 34 -
运行在以下环境
系统 fedora_34 kernel * Up to (excluding) 5.13.4-200.fc34
运行在以下环境
系统 kylinos_aarch64_V10SP2 kernel * Up to (excluding) 4.19.90-25.11.v2101.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP2 kernel * Up to (excluding) 4.19.90-25.11.v2101.ky10
运行在以下环境
系统 linux linux_kernel * From (including) 3.16 Up to (excluding) 5.13.4
运行在以下环境
系统 opensuse_Leap_15.2 kernel * Up to (excluding) 5.3.18-lp152.84.1
运行在以下环境
系统 opensuse_Leap_15.3 kernel * Up to (excluding) 5.3.18-59.16.1
运行在以下环境
系统 oracle_6 kernel * Up to (excluding) 2.6.32-754.35.1.0.4.el6
运行在以下环境
系统 oracle_7 kernel * Up to (excluding) 4.14.35-2047.505.4.3.el7uek
运行在以下环境
系统 oracle_8 kernel * Up to (excluding) 4.18.0-305.10.2.el8_4
运行在以下环境
系统 redhat_6 kernel * Up to (excluding) 0:2.6.32-754.41.2.el6
运行在以下环境
系统 redhat_7 kpatch-patch-3_10_0-1160 * Up to (excluding) 3.10.0-1160.36.2.el7
运行在以下环境
系统 redhat_8 kpatch-patch * Up to (excluding) 4.18.0-305.10.2.el8_4
运行在以下环境
系统 suse_12_SP5 kernel * Up to (excluding) 4.12.14-122.80.1
运行在以下环境
系统 ubuntu_18.04 linux-hwe-5.4 * Up to (excluding) 4.15.0-151.157
运行在以下环境
系统 ubuntu_18.04.5_lts linux * Up to (excluding) 4.15.0-151.157
运行在以下环境
系统 ubuntu_20.04 linux-bluefield * Up to (excluding) 5.4.0-1041.45
运行在以下环境
系统 ubuntu_21.04 linux * Up to (excluding) 5.11.0-1012.13
阿里云评分 3.1
  • 攻击路径 远程
  • 攻击复杂度 复杂
  • 权限要求 无需权限
  • 影响范围 有限影响
  • EXP成熟度 POC 已公开
  • 补丁情况 官方补丁
  • 数据保密性 无影响
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-120 未进行输入大小检查的缓冲区拷贝(传统缓冲区溢出)
CWE-190 整数溢出或超界折返
CWE-787 跨界内存写
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0