漏洞信息详情
Linux kernel 输入验证错误漏洞
- CNNVD编号:CNNVD-201908-829
- 危害等级: 高危
- CVE编号: CVE-2017-18509
- 漏洞类型: 输入验证错误
- 发布时间: 2019-08-13
- 威胁类型: 本地
- 更新时间: 2020-11-10
- 厂 商:
- 漏洞来源: Ubuntu
漏洞简介
Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。
Linux kernel 4.11之前版本中的net/ipv6/ip6mr.c文件存在安全漏洞。目前尚无此漏洞的相关信息,请随时关注CNNVD或厂商公告。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99253eb750fda6a644d5188fb26c43bad8d5a745
参考网址
来源:BUGTRAQ
链接:https://seclists.org/bugtraq/2019/Aug/26
来源:UBUNTU
链接:https://usn.ubuntu.com/4145-1/
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/08/msg00016.HTML
来源:MISC
链接:https://lists.openwall.net/netdev/2017/12/04/40
来源:MISC
链接:https://github.com/torvalds/linux/commit/99253eb750fda6a644d5188fb26c43bad8d5a745
来源:MISC
链接:https://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.HTML
来源:CONFIRM
链接:https://support.f5.com/csp/article/K41582535
来源:www.debian.org
链接:https://www.debian.org/security/2019/dsa-4497
来源:salsa.debian.org
链接:https://salsa.debian.org/kernel-team/linux/commit/baefcdc2f29923e7325ce4e1a72c3ff0a9800f32
来源:pulsesecurity.co.nz
链接:https://pulsesecurity.co.nz/advisories/linux-kernel-4.9-inetcsklistenstop-gpf
来源:git.kernel.org
链接:https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99253eb750fda6a644d5188fb26c43bad8d5a745
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/08/msg00017.HTML
来源:CONFIRM
链接:https://support.f5.com/csp/article/K41582535?utm_source=f5support&utm_medium=RSS
来源:lists.debian.org
链接:https://lists.debian.org/debian-lts-announce/2019/08/msg00016.HTML
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-201914218-1.HTML
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192984-1.HTML
来源:www.intel.com
链接:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00237.HTML
来源:usn.ubuntu.com
链接:https://usn.ubuntu.com/4145-1/
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.HTML
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192952-1.HTML
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192951-1.HTML
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192950-1.HTML
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192949-1.HTML
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192948-1.HTML
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.HTML
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.HTML
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Linux-kernel-memory-corruption-via-net-ipv6-ip6mr-c-30050
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2017-18509
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/154695/Ubuntu-Security-Notice-USN-4145-1.HTML
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3128/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4346/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4261/
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2017-18509
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4252/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3099/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3685/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4346.2/
受影响实体
暂无
补丁
- Linux kernel 安全漏洞的修复措施
![weinxin](http://zone.ci/zone_ci_images/zone.ci.png)
评论