漏洞信息详情

systemd 缓冲区错误漏洞

  • CNNVD编号:CNNVD-201902-729
  • 危害等级: 中危
  • CVE编号: CVE-2019-6454
  • 漏洞类型: 缓冲区错误
  • 发布时间: 2019-02-18
  • 威胁类型: 本地
  • 更新时间: 2022-02-21
  • 厂        商:
  • 漏洞来源: Ubuntu,Debian,Chri...

漏洞简介

systemd是德国Lennart Poettering个人开发者的一款基于Linux的系统和服务管理器。该产品兼容了SysV和LSB的启动脚本,且提供了一个用来表示系统服务间依赖关系的框架。

systemd中的bus_process_object()存在缓冲区错误漏洞,该漏洞源于程序没有充分地执行输入验证。本地攻击者可通过发送dbus消息利用该漏洞造成拒绝服务。

漏洞公告

目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法:

https://github.com/systemd/systemd

参考网址

来源:REDHAT

链接:https://access.redhat.com/errata/RHSA-2019:2805

来源:CONFIRM

链接:https://kc.mcafee.com/corporate/index?page=content&id=SB10278

来源:MLIST

链接:http://www.openwall.com/lists/oss-security/2021/07/20/2

来源:REDHAT

链接:https://access.redhat.com/errata/RHSA-2019:1502

来源:REDHAT

链接:https://access.redhat.com/errata/RHSA-2019:0368

来源:CONFIRM

链接:https://security.netapp.com/advisory/ntap-20190327-0004/

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html

来源:MLIST

链接:https://lists.debian.org/debian-lts-announce/2019/02/msg00031.html

来源:MLIST

链接:http://www.openwall.com/lists/oss-security/2019/02/18/3

来源:MLIST

链接:http://www.openwall.com/lists/oss-security/2019/02/19/1

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00070.html

来源:REDHAT

链接:https://access.redhat.com/errata/RHSA-2019:1322

来源:REDHAT

链接:https://access.redhat.com/errata/RHSA-2019:0990

来源:DEBIAN

链接:https://www.debian.org/security/2019/dsa-4393

来源:UBUNTU

链接:https://usn.ubuntu.com/3891-1/

来源:BID

链接:https://www.securityfocus.com/bid/107081

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N67IOBOTDOMVNQJ5QRU2MXLEECXPGNVJ/

来源:MISC

链接:https://github.com/systemd/systemd/commits/master/src/libsystemd/sd-bus/bus-objects.c

来源:www.ubuntu.com

链接:http://www.ubuntu.com/usn/usn-3891-1

来源:access.redhat.com

链接:https://access.redhat.com/errata/RHSA-2019:0368

来源:www.ibm.com

链接:http://www.ibm.com/support/docview.wss

来源:access.redhat.com

链接:https://access.redhat.com/errata/RHSA-2019:2805

来源:www.debian.org

链接:http://www.debian.org/security/2019/dsa-4393

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/75966

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/151741/Ubuntu-Security-Notice-USN-3891-1.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.3700/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/75786

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2019-6454

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/151743/Debian-Security-Advisory-4393-1.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/75794

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/systemd-buffer-overflow-via-D-Bus-Message-28537

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/76130

来源:www.securityfocus.com

链接:http://www.securityfocus.com/bid/107081

受影响实体

    暂无


补丁

    暂无

漏洞信息快速查询

相关漏洞

更多