| CNNVD-ID编号 | CNNVD-201905-168 | CVE编号 | CVE-2018-20836 |
| 发布时间 | 2019-05-07 | 更新时间 | 2021-02-04 |
| 漏洞类型 | 竞争条件问题 | 漏洞来源 | chenxiang.,Debian,Red Hat |
| 危险等级 | 高危 | 威胁类型 | 远程 |
| 厂商 | N/A | ||
Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。
Linux kernel 4.20之前版本中存在竞争条件问题漏洞。该漏洞源于网络系统或产品在运行过程中,并发代码需要互斥地访问共享资源时,对于并发访问的处理不当。
目前厂商已发布升级了Linux kernel 竞争条件问题漏洞的补丁,Linux kernel 竞争条件问题漏洞的补丁获取链接:
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b90cd6f2b905905fb42671009dc0e27c310a16ae
来源:github.com
链接:https://github.com/torvalds/linux/commit/b90cd6f2b905905fb42671009dc0e27c310a16ae
来源:git.kernel.org
来源:git.kernel.org
来源:www.linux.org
来源:BID
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20191855-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20191854-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20191823-2.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20191870-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192069-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192068-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-201914127-1.html
来源:www.debian.org
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192450-1.html
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160793/Red-Hat-Security-Advisory-2021-0019-01.html
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160682/Red-Hat-Security-Advisory-2020-5656-01.html
来源:nvd.nist.gov
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.ibm.com
来源:www.securityfocus.com
来源:www.auscert.org.au
来源:www.ibm.com
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Linux-kernel-use-after-free-via-smp-task-timedout-29763
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
暂无