Xen 竞争条件问题漏洞
CNNVD-ID编号 | CNNVD-201910-1878 | CVE编号 | CVE-2019-18421 |
发布时间 | 2019-10-31 | 更新时间 | 2020-08-14 |
漏洞类型 | 竞争条件问题 | 漏洞来源 | N/A |
危险等级 | 高危 | 威胁类型 | 远程 |
厂商 | N/A |
漏洞介绍
Xen是英国剑桥大学的一款开源的虚拟机监视器产品。该产品能够使不同和不兼容的操作系统运行在同一台计算机上,并支持在运行时进行迁移,保证正常运行并且避免宕机。
Xen 4.12.x及之前版本中存在安全漏洞。攻击者可利用该漏洞获取主机操作系统权限。
漏洞补丁
目前厂商已发布升级了Xen 竞争条件问题漏洞的补丁,Xen 竞争条件问题漏洞的补丁获取链接:
http://xenbits.xen.org/xsa/advisory-299.html
参考网址
来源:FEDORA
来源:www.openwall.com
链接:http://www.openwall.com/lists/oss-security/2019/10/31/3
来源:FEDORA
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00037.html
来源:xenbits.xen.org
链接:http://xenbits.xen.org/xsa/advisory-299.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192962-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192960-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2020/suse-su-20200334-1.html
来源:support.citrix.com
链接:https://support.citrix.com/article/CTX263477
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193296-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193297-1.html
来源:www.debian.org
链接:https://www.debian.org/security/2020/dsa-4602
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193293-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193307-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193308-1.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156920/Gentoo-Linux-Security-Advisory-202003-56.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4675.2/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0437/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4064/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0127/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4675/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2696/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4254/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2786/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4056/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0153/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0561/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/xsa-299-security-vulnerability/
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Xen-privilege-escalation-via-Restartable-PV-Type-Change-30763
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155956/Debian-Security-Advisory-4602-1.html
受影响实体
暂无
信息来源
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201910-1878

评论