Xen 输入验证错误漏洞
CNNVD-ID编号 | CNNVD-201912-524 | CVE编号 | CVE-2019-19578 |
发布时间 | 2019-12-11 | 更新时间 | 2020-08-25 |
漏洞类型 | 输入验证错误 | 漏洞来源 | N/A |
危险等级 | 高危 | 威胁类型 | 本地 |
厂商 | N/A |
漏洞介绍
Xen是英国剑桥大学的一款开源的虚拟机监视器产品。该产品能够使不同和不兼容的操作系统运行在同一台计算机上,并支持在运行时进行迁移,保证正常运行并且避免宕机。
Xen 4.12.x及之前版本中存在输入验证错误漏洞。攻击者可借助特制应用程序利用该漏洞导致管理程序崩溃(拒绝服务),或可能提升权限,获取信息。
漏洞补丁
目前厂商已发布升级了Xen 输入验证错误漏洞的补丁,Xen 输入验证错误漏洞的补丁获取链接:
https://xenbits.xen.org/xsa/advisory-309.html
参考网址
来源:xenbits.xen.org
链接:https://xenbits.xen.org/xsa/advisory-309.html
来源:BUGTRAQ
链接:https://seclists.org/bugtraq/2020/Jan/21
来源:FEDORA
来源:GENTOO
链接:https://security.gentoo.org/glsa/202003-56
来源:FEDORA
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00011.html
来源:DEBIAN
链接:https://www.debian.org/security/2020/dsa-4602
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2020/suse-su-20200334-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193296-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193297-1.html
来源:www.debian.org
链接:https://www.debian.org/security/2020/dsa-4602
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193338-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193293-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193307-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193308-1.html
来源:www.intel.com
链接:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00317.html
来源:www.intel.com
链接:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00289.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156920/Gentoo-Linux-Security-Advisory-202003-56.html
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2019-19578
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4656/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4675.2/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4722/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0437/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0127/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4675/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2696/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0153/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0561/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-19578
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Xen-memory-corruption-via-Linear-Pagetable-Miscounts-31125
受影响实体
暂无
信息来源
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201912-524

评论