Linux kernel 输入验证错误漏洞

admin 2024-01-14 00:44:56 YS 来源:ZONE.CI 全球网 0 阅读模式
> Linux kernel 输入验证错误漏洞

Linux kernel 输入验证错误漏洞

CNNVD-ID编号 CNNVD-201912-554 CVE编号 CVE-2019-5108
发布时间 2019-12-11 更新时间 2020-08-10
漏洞类型 输入验证错误 漏洞来源 Ubuntu,Red Hat,Benjamin M. Romer
危险等级 中危 威胁类型 远程或本地
厂商 N/A

漏洞介绍

Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。

Linux kernel 5.3之前版本(mainline)中存在安全漏洞。攻击者可利用该漏洞造成拒绝服务。

漏洞补丁

目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页:

参考网址

来源:MISC

链接:https://talosintelligence.com/vulnerability_reports/TALOS-2019-0900

来源:MISC

链接:https://git.kernel.org/linus/3e493173b7841259a08c5c8e5cbe90adb349da7e

来源:MLIST

链接:https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html

来源:MLIST

链接:https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html

来源:MLIST

链接:https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html

来源:CONFIRM

链接:https://security.netapp.com/advisory/ntap-20200204-0002/

来源:UBUNTU

链接:https://usn.ubuntu.com/4285-1/

来源:UBUNTU

链接:https://usn.ubuntu.com/4287-2/

来源:MISC

链接:https://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html

来源:UBUNTU

链接:https://usn.ubuntu.com/4286-2/

来源:UBUNTU

链接:https://usn.ubuntu.com/4287-1/

来源:UBUNTU

链接:https://usn.ubuntu.com/4286-1/

来源:DEBIAN

链接:https://www.debian.org/security/2020/dsa-4698

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4287-2/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4287-1/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4286-2/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4286-1/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4285-1/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4284-1/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1204/

来源:www.talosintelligence.com

链接:https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0900

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/156429/Ubuntu-Security-Notice-USN-4286-2.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0572.2/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/157260/Red-Hat-Security-Advisory-2020-1493-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1745.2/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0572/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2711/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2039/

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/Linux-kernel-denial-of-service-via-Inter-Access-Point-Protocol-31145

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2008/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1230/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1745/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1812/

受影响实体

暂无

信息来源

http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201912-554

weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  0