漏洞信息详情

GNU C Library 缓冲区错误漏洞

  • CNNVD编号:CNNVD-201902-935
  • 危害等级: 超危
  • CVE编号: CVE-2019-9169
  • 漏洞类型: 缓冲区错误
  • 发布时间: 2019-02-25
  • 威胁类型: 远程
  • 更新时间: 2020-07-10
  • 厂        商:
  • 漏洞来源: Ubuntu,Hongxu Chen

漏洞简介

GNU C Library(glibc,libc6)是一种按照LGPL许可协议发布的开源免费的C语言编译程序。

GNU C Library 2.29及之前版本中的posix/regexec.c文件的proceed_next_node存在安全漏洞。目前尚无此漏洞的相关信息,请随时关注CNNVD或厂商公告。

漏洞公告

目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法:

https://www.gnu.org/s/libc/

参考网址

来源:GENTOO

链接:https://security.gentoo.org/glsa/202006-04

来源:CONFIRM

链接:https://kc.mcafee.com/corporate/index?page=content&id=SB10278

来源:BID

链接:http://www.securityfocus.com/bid/107160

来源:MISC

链接:https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9

来源:BID

链接:https://www.securityfocus.com/bid/107160

来源:CONFIRM

链接:https://security.netapp.com/advisory/ntap-20190315-0002/

来源:MISC

链接:https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142

来源:sourceware.org

链接:https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9Mailing ListPatchThird Party Advisory

来源:sourceware.org

链接:https://sourceware.org/bugzilla/show_bug.cgi?id=24114Issue TrackingPatchThird Party Advisory

来源:debbugs.gnu.org

链接:https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142ExploitMailing ListVendor Advisory

来源:debbugs.gnu.org

链接:https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140ExploitMailing ListVendor Advisory

来源:UBUNTU

链接:https://usn.ubuntu.com/4416-1/

来源:CONFIRM

链接:https://support.f5.com/csp/article/K54823184

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20191877-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-201914084-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20191958-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20191102-1.html

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2019-9169

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/158064/Gentoo-Linux-Security-Advisory-202006-04.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/79918

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.2756/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.2690/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/158314/Ubuntu-Security-Notice-USN-4416-1.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.2146/

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/glibc-out-of-bounds-memory-reading-via-proceed-next-node-28995

来源:www.securityfocus.com

链接:http://www.securityfocus.com/bid/107160

来源:www.ibm.com

链接:https://www.ibm.com/support/pages/node/1143466

来源:www.nsfocus.net

链接:http://www.nsfocus.net/vulndb/42819

受影响实体

    暂无


补丁

    暂无

漏洞信息快速查询

相关漏洞

更多