CVE编号
CVE-2020-14314利用情况
暂无补丁情况
官方补丁披露时间
2020-09-16漏洞描述
在 Linux kernel的ext3/ext4文件系统中发现了一个内存越界读取漏洞,即它访问索引损坏的目录的方式。此缺陷允许本地用户在目录存在时使系统崩溃。此漏洞的最大威胁是系统可用性。解决建议
厂商已发布了漏洞修复程序,请及时关注更新:https://security-tracker.debian.org/tracker/CVE-2020-14314
参考链接 |
|
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14314 | |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id... | |
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html | |
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html | |
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html | |
https://lore.kernel.org/linux-ext4/f53e246b-647c-64bb-16ec-135383c70ad7@redha... | |
https://usn.ubuntu.com/4576-1/ | |
https://usn.ubuntu.com/4578-1/ | |
https://usn.ubuntu.com/4579-1/ |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | amazon linux_2 | linux | * |
Up to (excluding) 4.14.198-152.320.amzn2 |
|||||
运行在以下环境 | |||||||||
系统 | amazon linux_AMI | linux | * |
Up to (excluding) 4.14.200-116.320.amzn1 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_2 | linux | * |
Up to (excluding) 4.14.198-152.320.amzn2 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_AMI | linux | * |
Up to (excluding) 4.14.200-116.320.amzn1 |
|||||
运行在以下环境 | |||||||||
系统 | centos_7 | linux | * |
Up to (excluding) 3.10.0-1160.11.1.el7 |
|||||
运行在以下环境 | |||||||||
系统 | centos_8 | linux | * |
Up to (excluding) 4.18.0-305.el8 |
|||||
运行在以下环境 | |||||||||
系统 | debian_10 | linux | * |
Up to (excluding) 4.19.146-1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | linux | * |
Up to (excluding) 4.9.240-1 |
|||||
运行在以下环境 | |||||||||
系统 | linux | linux_kernel | * |
Up to (including) 5.8.9 |
|||||
运行在以下环境 | |||||||||
系统 | linux | linux_kernel | 5.9.0 | - | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.1 | linux | * |
Up to (excluding) 4.12.14-lp151.28.63.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.2 | linux | * |
Up to (excluding) 5.3.18-lp152.41.1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle linux_5 | linux | * |
Up to (excluding) 2.6.39-400.326.1.el5uek |
|||||
运行在以下环境 | |||||||||
系统 | oracle linux_6 | linux | * |
Up to (excluding) 4.1.12-124.43.4.el6uek |
|||||
运行在以下环境 | |||||||||
系统 | oracle linux_7 | linux | * |
Up to (excluding) 4.1.12-124.43.4.el7uek |
|||||
运行在以下环境 | |||||||||
系统 | oracle linux_8 | linux | * |
Up to (excluding) 5.4.17-2011.7.4.el8uek |
|||||
运行在以下环境 | |||||||||
系统 | oracle_5 | linux | * |
Up to (excluding) 2.6.39-400.326.1.el6uek |
|||||
运行在以下环境 | |||||||||
系统 | oracle_6 | linux | * |
Up to (excluding) 4.1.12-124.43.4.el7uek |
|||||
运行在以下环境 | |||||||||
系统 | oracle_7 | linux | * |
Up to (excluding) 4.1.12-124.43.4.el7uek |
|||||
运行在以下环境 | |||||||||
系统 | oracle_8 | linux | * |
Up to (excluding) 5.4.17-2011.7.4.el8uek |
|||||
运行在以下环境 | |||||||||
系统 | redhat_7 | bpftool | * |
Up to (excluding) 0:3.10.0-1160.11.1.el7 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_7 | kernel-rt | * |
Up to (excluding) 0:3.10.0-1160.11.1.rt56.1145.el7 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_8 | linux | * |
Up to (excluding) 4.18.0-305.el8 |
|||||
运行在以下环境 | |||||||||
系统 | sles_12_SP5 | linux | * |
Up to (excluding) 4.12.14-16.25.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | linux | * |
Up to (excluding) 4.12.14-16.25.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04 | linux | * |
Up to (excluding) 4.4.0-1081.85 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04_lts | linux-aws | * |
Up to (excluding) 4.4.0-1081.85 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04 | linux | * |
Up to (excluding) 4.4.0-1145.155 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04_lts | linux | * |
Up to (excluding) 4.4.0-193.224 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04 | linux | * |
Up to (excluding) 4.15.0-121.123 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04_lts | linux | * |
Up to (excluding) 4.15.0-121.123 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_20.04 | linux | * |
Up to (excluding) 5.4.0-1021.24 |
|||||
- 攻击路径 本地
- 攻击复杂度 复杂
- 权限要求 普通权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...