Linux kernel 输入验证错误漏洞

admin 2022-07-25 23:29:41 CNNVD漏洞 来源:ZONE.CI 全球网 0 阅读模式

漏洞信息详情

Linux kernel 输入验证错误漏洞

  • CNNVD编号:CNNVD-201908-829
  • 危害等级: 高危
  • CVE编号: CVE-2017-18509
  • 漏洞类型: 输入验证错误
  • 发布时间: 2019-08-13
  • 威胁类型: 本地
  • 更新时间: 2020-11-10
  • 厂        商:
  • 漏洞来源: Ubuntu

漏洞简介

Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。

Linux kernel 4.11之前版本中的net/ipv6/ip6mr.c文件存在安全漏洞。目前尚无此漏洞的相关信息,请随时关注CNNVD或厂商公告。

漏洞公告

目前厂商已发布升级补丁以修复漏洞,补丁获取链接:

https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99253eb750fda6a644d5188fb26c43bad8d5a745

参考网址

来源:BUGTRAQ

链接:https://seclists.org/bugtraq/2019/Aug/26

来源:UBUNTU

链接:https://usn.ubuntu.com/4145-1/

来源:MLIST

链接:https://lists.debian.org/debian-lts-announce/2019/08/msg00016.HTML

来源:MISC

链接:https://lists.openwall.net/netdev/2017/12/04/40

来源:MISC

链接:https://github.com/torvalds/linux/commit/99253eb750fda6a644d5188fb26c43bad8d5a745

来源:MISC

链接:https://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.HTML

来源:CONFIRM

链接:https://support.f5.com/csp/article/K41582535

来源:www.debian.org

链接:https://www.debian.org/security/2019/dsa-4497

来源:salsa.debian.org

链接:https://salsa.debian.org/kernel-team/linux/commit/baefcdc2f29923e7325ce4e1a72c3ff0a9800f32

来源:pulsesecurity.co.nz

链接:https://pulsesecurity.co.nz/advisories/linux-kernel-4.9-inetcsklistenstop-gpf

来源:git.kernel.org

链接:https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99253eb750fda6a644d5188fb26c43bad8d5a745

来源:MLIST

链接:https://lists.debian.org/debian-lts-announce/2019/08/msg00017.HTML

来源:CONFIRM

链接:https://support.f5.com/csp/article/K41582535?utm_source=f5support&utm_medium=RSS

来源:lists.debian.org

链接:https://lists.debian.org/debian-lts-announce/2019/08/msg00016.HTML

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-201914218-1.HTML

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192984-1.HTML

来源:www.intel.com

链接:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00237.HTML

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4145-1/

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.HTML

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192952-1.HTML

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192951-1.HTML

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192950-1.HTML

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192949-1.HTML

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192948-1.HTML

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.HTML

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.HTML

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/Linux-kernel-memory-corruption-via-net-ipv6-ip6mr-c-30050

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2017-18509

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/154695/Ubuntu-Security-Notice-USN-4145-1.HTML

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.3128/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4346/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4261/

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2017-18509

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4252/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.3099/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.3685/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4346.2/

受影响实体

    暂无


补丁

  • Linux kernel 安全漏洞的修复措施

weinxin
特别声明
本站(ZONE.CI)所有文章仅供技术研究,若将其信息做其他用途,由用户承担全部法律及连带责任,本站不承担任何法律及连带责任,请遵守中华人民共和国安全法.
评论:0   参与:  0