漏洞信息详情
Linux kernel EFI子系统代码问题漏洞
漏洞简介
Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。
Linux kernel 5.1.5之前版本中的EFI子系统存在代码问题漏洞,该漏洞源于arch/x86/platform/efi/efi.c和efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c文件中的‘phys_efi_set_virtual_address_map’函数错误地处理了内存分配失败的情况。攻击者可利用该漏洞造成拒绝服务。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=4e78921ba4dd0aca1cc89168f45039add4183f8e
参考网址
来源:git.kernel.org
链接:https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=4e78921ba4dd0aca1cc89168f45039add4183f8e
来源:www.securityfocus.com
链接:http://www.securityfocus.com/bid/108477
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20190710-0002/
来源:UBUNTU
链接:https://usn.ubuntu.com/4414-1/
来源:www.kernel.org
链接:http://www.kernel.org/
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
来源:BID
链接:https://www.securityfocus.com/bid/108477
来源:UBUNTU
链接:https://usn.ubuntu.com/4427-1/
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
来源:UBUNTU
链接:https://usn.ubuntu.com/4439-1/
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20191855-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20191854-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20191823-2.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192430-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192450-1.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3590/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.2626/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158509/Ubuntu-Security-Notice-USN-4427-1.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158628/Ubuntu-Security-Notice-USN-4439-1.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2507/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158295/Ubuntu-Security-Notice-USN-4414-1.html
来源:www.securityfocus.com
链接:https://www.securityfocus.com/bid/108477
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-12380
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3612/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2389/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2562/
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Linux-kernel-NULL-pointer-dereference-via-EFI-29423
受影响实体
暂无
补丁
- Linux kernel EFI子系统安全漏洞的修复措施<!--2019-5-27-->
还没有评论,来说两句吧...