| CNNVD-ID编号 | CNNVD-201909-807 |
| CVE编号 | CVE-2019-14835 |
| 发布时间 | 2019-09-17 |
| 更新时间 | 2020-10-16 |
| 漏洞类型 | 缓冲区错误 |
| 漏洞来源 | Ubuntu,该漏洞由Linux内核社区公开披露。,Red Hat |
| 危险等级 | 高危 |
| 威胁类型 | 本地 |
| 厂 商 | N/A |
Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。
Linux kernel 2.6.34版本至5.2.x版本(5.3版本已修复)中的vhost功能记录缓冲区描述符的方法存在缓冲区错误漏洞。该漏洞源于网络系统或产品在内存上执行操作时,未正确验证数据边界,导致向关联的其他内存位置上执行了错误的读写操作。攻击者可利用该漏洞导致缓冲区溢出或堆溢出等。
目前厂商已发布升级了Linux kernel 缓冲区错误漏洞的补丁,Linux kernel 缓冲区错误漏洞的补丁获取链接:
https://git.kernel.org/pub/scm/linux/kernel/git/mst/vhost.git/commit/?h=for_linus&id=060423bfdee3f8bc6e2c1bac97de24d5415e2bc4
来源:DEBIAN
来源:UBUNTU
来源:MLIST
来源:MISC
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
来源:REDHAT
来源:www.openwall.com
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14835
来源:REDHAT
来源:MISC
链接:https://packetstormsecurity.com/files/154572/Kernel-Live-Patch-Security-Notice-LSN-0056-1.html
来源:REDHAT
来源:REDHAT
来源:CONFIRM
链接:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-qemu-en
来源:REDHAT
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html
来源:CONFIRM
来源:UBUNTU
来源:MISC
链接:https://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
来源:REDHAT
来源:REDHAT
来源:REDHAT
来源:REDHAT
来源:REDHAT
来源:REDHAT
来源:REDHAT
来源:MLIST
来源:REDHAT
来源:REDHAT
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
来源:REDHAT
来源:REDHAT
来源:REDHAT
来源:REDHAT
来源:BUGTRAQ
来源:FEDORA
来源:MLIST
来源:MLIST
来源:BUGTRAQ
来源:FEDORA
来源:usn.ubuntu.com
来源:usn.ubuntu.com
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-201914218-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192984-1.html
来源:www.intel.com
链接:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00237.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193200-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192952-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192951-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192950-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192949-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192948-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Linux-kernel-buffer-overflow-via-vhost-vhost-net-30355
来源:nvd.nist.gov
来源:www.huawei.com
链接:https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200115-01-qemu-cn
来源:www.auscert.org.au
来源:access.redhat.com
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/154558/Red-Hat-Security-Advisory-2019-2854-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/154514/Ubuntu-Security-Notice-USN-4135-1.html
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.ibm.com
来源:www.auscert.org.au
暂无