漏洞信息详情
Linux kernel 资源管理错误漏洞
漏洞简介
Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。
Linux kernel 5.4.0-rc2版本中的kernel/trace/blktrace.c文件的‘__blk_add_trace’函数资源管理错误漏洞。本地攻击者可借助特制请求利用该漏洞导致拒绝服务。
漏洞公告
目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法:
https://www.kernel.org/
参考网址
来源:UBUNTU
链接:https://usn.ubuntu.com/4342-1/
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
来源:UBUNTU
链接:https://usn.ubuntu.com/4344-1/
来源:MISC
链接:https://bugzilla.kernel.org/show_bug.cgi?id=205711
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20200103-0001/
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
来源:UBUNTU
链接:https://usn.ubuntu.com/4346-1/
来源:UBUNTU
链接:https://usn.ubuntu.com/4345-1/
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
来源:DEBIAN
链接:https://www.debian.org/security/2020/dsa-4698
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1585/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1673/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1770/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-data-risk-manager-is-affected-by-multiple-vulnerabilities-3/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-19768
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157491/Ubuntu-Security-Notice-USN-4346-1.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158043/Red-Hat-Security-Advisory-2020-2522-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1745.2/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157767/Red-Hat-Security-Advisory-2020-2214-01.html
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-linux-kernel-affect-ibm-spectrum-protect-plus-2/
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Linux-kernel-use-after-free-via-blk-add-trace-31148
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2039/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2008/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1480/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1164/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157444/Red-Hat-Security-Advisory-2020-1567-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157671/Red-Hat-Security-Advisory-2020-2082-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1745/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1812/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1853/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157783/Red-Hat-Security-Advisory-2020-2242-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1770.2/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157825/Red-Hat-Security-Advisory-2020-2291-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1431/
受影响实体
暂无
补丁
暂无
还没有评论,来说两句吧...