Linux kernel 缓冲区错误漏洞
+ 查看更多
Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。AESM daemon是其中的一个AESM守护程序。
Linux kernel 4.x版本中的的32位系统调用界面的桥接实现存在缓冲区错误漏洞。该漏洞源于网络系统或产品在内存上执行操作时,未正确验证数据边界,导致向关联的其他内存位置上执行了错误的读写操作。攻击者可利用该漏洞导致缓冲区溢出或堆溢出等。
目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b71812168571fa55e44cdd0254471331b9c4c4c6
来源:UBUNTU
链接:https://usn.ubuntu.com/3656-1/
来源:CONFIRM
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1552048
来源:UBUNTU
链接:https://usn.ubuntu.com/3677-2/
来源:DEBIAN
链接:https://www.debian.org/security/2018/dsa-4188
来源:BID
链接:http://www.securityfocus.com/bid/103459
来源:DEBIAN
链接:https://www.debian.org/security/2018/dsa-4187
来源:MLIST
链接:https://marc.info/?l=linux-netdev&m=152025888924151&w=2
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2018:1318
来源:MLIST
链接:https://marc.info/?l=linux-netdev&m=152023808817590&w=2
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2018:1355
来源:UBUNTU
链接:https://usn.ubuntu.com/3674-2/
来源:UBUNTU
链接:https://usn.ubuntu.com/3674-1/
来源:UBUNTU
链接:https://usn.ubuntu.com/3677-1/
来源:CONFIRM
链接:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b71812168571fa55e44cdd0254471331b9c4c4c6
来源:CONFIRM
链接:https://github.com/torvalds/linux/commit/b71812168571fa55e44cdd0254471331b9c4c4c6
来源:UBUNTU
链接:https://usn.ubuntu.com/3654-1/
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:1170
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2018:2948
来源:UBUNTU
链接:https://usn.ubuntu.com/3654-2/
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:1190
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:1174
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:4168
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:4164
来源:access.redhat.com
链接::https://access.redhat.com/errata/RHSA-2019:4159
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:4154
来源:www.ibm.com
链接:http://www.ibm.com/support/docview.wss?uid=ibm10872142
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/75922
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4608/
来源:packetstormsecurity.com
链接::https://packetstormsecurity.com/files/152897/Red-Hat-Security-Advisory-2019-1190-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155607/Red-Hat-Security-Advisory-2019-4159-01.html
来源:www.ibm.com
链接:http://www.ibm.com/support/docview.wss?uid=ibm10879093
来源:www-01.ibm.com
链接:https://www-01.ibm.com/support/docview.wss?uid=ibm10872142
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/78218
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/80978