| CNNVD-ID编号 | CNNVD-201904-1320 |
| CVE编号 | CVE-2019-11599 |
| 发布时间 | 2019-04-29 |
| 更新时间 | 2020-08-25 |
| 漏洞类型 | 竞争条件问题 |
| 漏洞来源 | Google Security Research,Red Hat,Jann Horn of Google Project Zero ?? ??,Jann Horn of Google Project Zero.,Jann Horn |
| 危险等级 | 高危 |
| 威胁类型 | 本地 |
| 厂 商 | N/A |
Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。
Linux kernel 5.0.10之前版本中的coredump实现存在安全漏洞,该漏洞源于程序没有使用锁定及其他机制来阻止对vma部署和标识(flag)的更改。攻击者可利用该漏洞获取敏感信息或造成拒绝服务。
目前厂商已发布升级了Linux kernel 竞争条件问题漏洞的补丁,Linux kernel 竞争条件问题漏洞的补丁获取链接:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04f5866e41fb70690e28397487d8bd8eea7d712a
来源:github.com
链接:https://github.com/torvalds/linux/commit/04f5866e41fb70690e28397487d8bd8eea7d712a
来源:git.kernel.org
来源:cdn.kernel.org
链接:https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10
来源:cdn.kernel.org
链接:https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.37
来源:cdn.kernel.org
链接:https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.114
来源:bugs.chromium.org
链接:https://bugs.chromium.org/p/project-zero/issues/detail?id=1790
来源:www.openwall.com
来源:www.openwall.com
来源:CONFIRM
链接:https://support.f5.com/csp/article/K51674118?utm_source=f5support&utm_medium=RSS
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html
来源:REDHAT
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html
来源:MLIST
来源:BID
来源:MISC
链接:https://packetstormsecurity.com/files/152663/Linux-Missing-Lockdown.html
来源:REDHAT
来源:UBUNTU
来源:www.linux.org
来源:git.kernel.org
来源:CONFIRM
来源:REDHAT
来源:REDHAT
来源:REDHAT
来源:BUGTRAQ
来源:DEBIAN
来源:EXPLOIT-DB
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html
来源:UBUNTU
来源:REDHAT
来源:REDHAT
来源:BID
来源:MISC
来源:CONFIRM
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html
来源:BUGTRAQ
来源:UBUNTU
来源:UBUNTU
来源:UBUNTU
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html
来源:MISC
链接:http://packetstormsecurity.com/files/152663/Linux-Missing-Lockdown.html
来源:REDHAT
来源:lists.debian.org
链接:https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html
来源:www.debian.org
来源:lists.debian.org
链接:https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html
来源:lists.debian.org
链接:https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html
来源:access.redhat.com
来源:access.redhat.com
来源:access.redhat.com
来源:vigilance.fr
来源:www.auscert.org.au
来源:nvd.nist.gov
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/152663/Linux-Missing-Lockdown.html
来源:www.ibm.com
来源:www.auscert.org.au
来源:support.lenovo.com
链接:https://support.lenovo.com/us/en/product_security/LEN-29592
来源:www.securityfocus.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156023/Red-Hat-Security-Advisory-2020-0179-01.html
来源:www.auscert.org.au
来源:www.exploit-db.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156405/Red-Hat-Security-Advisory-2020-0543-01.html
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155951/Red-Hat-Security-Advisory-2020-0103-01.html
暂无