CVE编号
CVE-2018-7566利用情况
暂无补丁情况
官方补丁披露时间
2018-03-31漏洞描述
ALSASequencer内核通过调用SND_SEQ_POOL_INIT()在第一次写入发生时调用SND_SEQ_POOL_INIT()初始化事件池,并且该池为空。用户可以同时通过ioctl手动重置池的大小,这可能导致UAF或带外访问。 <br /> 解决建议
厂商已发布漏洞修复程序,请及时关注更新:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d15d662e89fc667b90cd294b0eb45694e33144da
参考链接 |
|
---|---|
http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html | |
http://mailman.alsa-project.org/pipermail/alsa-devel/2018-February/132026.html | |
http://www.securityfocus.com/bid/103605 | |
https://access.redhat.com/errata/RHSA-2018:2384 | |
https://access.redhat.com/errata/RHSA-2018:2390 | |
https://access.redhat.com/errata/RHSA-2018:2395 | |
https://access.redhat.com/errata/RHSA-2018:2948 | |
https://access.redhat.com/errata/RHSA-2019:1483 | |
https://access.redhat.com/errata/RHSA-2019:1487 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1550142 | |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id... | |
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+Stru... | |
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html | |
https://usn.ubuntu.com/3631-1/ | |
https://usn.ubuntu.com/3631-2/ | |
https://usn.ubuntu.com/3798-1/ | |
https://usn.ubuntu.com/3798-2/ | |
https://www.debian.org/security/2018/dsa-4187 | |
https://www.debian.org/security/2018/dsa-4188 | |
https://www.oracle.com/security-alerts/cpujul2020.html | |
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | oracle | communications_eagle_application_processor | 16.1.0 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | communications_eagle_application_processor | 16.2.0 | - | |||||
运行在以下环境 | |||||||||
应用 | suse | linux_enterprise_module_for_public_cloud | 12 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 12.04 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 14.04 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 16.04 | - | |||||
运行在以下环境 | |||||||||
系统 | debian | debian_linux | 7.0 | - | |||||
运行在以下环境 | |||||||||
系统 | debian | debian_linux | 8.0 | - | |||||
运行在以下环境 | |||||||||
系统 | debian | debian_linux | 9.0 | - | |||||
运行在以下环境 | |||||||||
系统 | linux | linux_kernel | 4.15 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_desktop | 6.0 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_desktop | 7.0 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_server | 6.0 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_server | 7.0 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_server_aus | 7.6 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_server_eus | 7.5 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_server_eus | 7.6 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_server_tus | 7.6 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_workstation | 6.0 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_workstation | 7.0 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat_6 | kernel | * |
Up to (excluding) 0:2.6.32-754.3.5.el6 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_7 | kernel | * |
Up to (excluding) 0:3.10.0-862.11.6.el7 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_7 | kernel-rt | * |
Up to (excluding) 0:3.10.0-862.11.6.rt56.819.el7 |
|||||
运行在以下环境 | |||||||||
系统 | sles_12 | kernel-default-extra | * |
Up to (excluding) 4.12.14-94.41 |
|||||
运行在以下环境 | |||||||||
系统 | suse | linux_enterprise_server | 12 | - | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04_lts | linux | * |
Up to (excluding) 3.13.0-161.211 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04_lts | linux | * |
Up to (excluding) 4.4.0-127.153 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04_lts | linux | * |
Up to (excluding) 4.15.0-13.14 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.10 | linux | * |
Up to (excluding) 4.15.0-20.21 |
|||||
- 攻击路径 本地
- 攻击复杂度 复杂
- 权限要求 普通权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...