漏洞信息详情
Linux kernel 资源管理错误漏洞
漏洞简介
Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。
Linux kernel 5.3.11及之前版本中的drivers/net/wireless/ath/ath9k/wmi.c文件的‘ath9k_wmi_cmd()’函数存在内存泄露漏洞。攻击者可利用该漏洞造成拒绝服务(内存消耗)。
漏洞公告
目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法:
https://www.kernel.org/
参考网址
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20191205-0001/
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
来源:MISC
链接:https://github.com/torvalds/linux/commit/728c1e2a05e4b5fc52fab3421dce772a806612a2
来源:UBUNTU
链接:https://usn.ubuntu.com/4526-1/
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
来源:UBUNTU
链接:https://usn.ubuntu.com/4527-1/
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
来源:MISC
链接:https://www.oracle.com/security-alerts/cpuApr2021.html
来源:www.intel.com
链接:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00237.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193200-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193381-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193316-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193317-1.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1585/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4704/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4793/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0851/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1745.2/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4584/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0830/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-19074
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0141/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1480/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157444/Red-Hat-Security-Advisory-2020-1567-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3236/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3269/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1745/
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Linux-kernel-multiple-vulnerabilities-via-Memory-Leak-30911
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3775/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4346.2/
受影响实体
暂无
补丁
暂无
还没有评论,来说两句吧...