漏洞信息详情
GNU C Library 缓冲区错误漏洞
漏洞简介
GNU C Library(glibc,libc6)是一种按照LGPL许可协议发布的开源免费的C语言编译程序。
GNU C Library 2.29及之前版本中的posix/regexec.c文件的proceed_next_node存在安全漏洞。目前尚无此漏洞的相关信息,请随时关注CNNVD或厂商公告。
漏洞公告
目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法:
https://www.gnu.org/s/libc/
参考网址
来源:GENTOO
链接:https://security.gentoo.org/glsa/202006-04
来源:CONFIRM
链接:https://kc.mcafee.com/corporate/index?page=content&id=SB10278
来源:BID
链接:http://www.securityfocus.com/bid/107160
来源:MISC
链接:https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9
来源:BID
链接:https://www.securityfocus.com/bid/107160
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20190315-0002/
来源:MISC
链接:https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
来源:sourceware.org
链接:https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9Mailing ListPatchThird Party Advisory
来源:sourceware.org
链接:https://sourceware.org/bugzilla/show_bug.cgi?id=24114Issue TrackingPatchThird Party Advisory
来源:debbugs.gnu.org
链接:https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142ExploitMailing ListVendor Advisory
来源:debbugs.gnu.org
链接:https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140ExploitMailing ListVendor Advisory
来源:UBUNTU
链接:https://usn.ubuntu.com/4416-1/
来源:CONFIRM
链接:https://support.f5.com/csp/article/K54823184
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20191877-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20191958-2.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20191958-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-201914084-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20191102-1.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164192/Red-Hat-Security-Advisory-2021-3556-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158064/Gentoo-Linux-Security-Advisory-202006-04.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/163789/Red-Hat-Security-Advisory-2021-3119-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.1866
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/glibc-out-of-bounds-memory-reading-via-proceed-next-node-28995
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2657
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.1743
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.1820
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2711
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/163747/Red-Hat-Security-Advisory-2021-3016-01.html
来源:www.nsfocus.net
链接:http://www.nsfocus.net/vulndb/42819
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2365
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2180
来源:www.securityfocus.com
链接:http://www.securityfocus.com/bid/107160
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/162634/Red-Hat-Security-Advisory-2021-1585-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/163276/Red-Hat-Security-Advisory-2021-2543-01.html
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-9169
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/79918
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.2756/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158314/Ubuntu-Security-Notice-USN-4416-1.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/163496/Red-Hat-Security-Advisory-2021-2705-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.2146/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2228
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021062703
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021092220
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/162837/Red-Hat-Security-Advisory-2021-2136-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/163267/Red-Hat-Security-Advisory-2021-2532-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.2690/
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021071516
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/162877/Red-Hat-Security-Advisory-2021-2121-01.html
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021062315
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1143466
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3141
受影响实体
暂无
补丁
暂无
还没有评论,来说两句吧...