Linux kernel 输入验证错误漏洞

admin 2024-01-13 22:23:43 YS 来源:ZONE.CI 全球网 0 阅读模式
> Linux kernel 输入验证错误漏洞

Linux kernel 输入验证错误漏洞

CNNVD-ID编号 CNNVD-201911-387 CVE编号 CVE-2019-18805
发布时间 2019-11-07 更新时间 2020-07-10
漏洞类型 输入验证错误 漏洞来源 N/A
危险等级 超危 威胁类型 远程
厂商 N/A

漏洞介绍

Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。

Linux kernel 5.0.11之前版本中的net/ipv4/sysctl_net_ipv4.c文件的‘tcp_ack_update_rtt’函数存在输入验证错误漏洞。远程攻击者可利用该漏洞导致拒绝服务。

漏洞补丁

目前厂商已发布升级了Linux kernel 输入验证错误漏洞的补丁,Linux kernel 输入验证错误漏洞的补丁获取链接:

参考网址

来源:MISC

链接:https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.11

来源:git.kernel.org

链接:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19fad20d15a6494f47f85d869f00b11343ee5c78

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193294-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193295-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192984-1.html

来源:www.intel.com

链接:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00237.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193200-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192952-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192951-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192950-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192949-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192948-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193381-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193316-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193317-1.html

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2019-18805

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4704/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0849/

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/Linux-kernel-integer-overflow-via-tcp-ack-update-rtt-30811

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4676/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4346/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/156658/Red-Hat-Security-Advisory-2020-0740-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4793/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4252/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4584/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0141/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1480/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/157444/Red-Hat-Security-Advisory-2020-1567-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4346.2/

受影响实体

暂无

信息来源

http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201911-387

weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  0