• 安全漏洞

    安全漏洞補丁公告

    當前位置  >  首頁  >  服務支持  >  安全漏洞  >  安全漏洞補丁公告

    公告ID(KYSA-202303-1056

    公告ID:KYSA-202303-1056 公告摘要:kernel安全漏洞 等級:Important 發布日期:2023-03-14

    詳細介紹

    1.修復的CVE ·CVE-2021-26401 描述:AMD CPUs是美國AMD公司的一個GPU組件。AMD CPUs 存在安全漏洞,該漏洞源于攻擊者可以通過分支預測器選擇器 lfence/jmp 繞過對 AMD 處理器數據的訪問限制,以讀取敏感信息。 ·CVE-2022-0001 描述:Linux kernel是美國Linux基金會的開源操作系統Linux所使用的內核。Linux kernel 存在安全漏洞,該漏洞源于英特爾為他們的產品添加的硬件緩解措施存在不足。攻擊者可利用該漏洞獲取敏感信息。 ·CVE-2022-0002 描述:Linux kernel是美國Linux基金會的開源操作系統Linux所使用的內核。Linux kernel 存在信息泄露漏洞,該漏洞源于 Intel 為其處理器添加的硬件緩解措施不足以解決 Spectre-BTI 漏洞。 ·CVE-2022-0480 描述:一個缺陷被發現在filelock_init fs /鎖。c函數在Linux內核中。這個問題會導致主機內存耗盡由于memcg不限制數量的可移植操作系統接口(POSIX)文件鎖。 ·CVE-2022-0850 描述:Linux kernel是美國Linux基金會的開源操作系統Linux所使用的內核。Linux Kernel 存在安全漏洞,目前尚無此漏洞的相關信息,請隨時關注CNNVD或廠商公告。 ·CVE-2022-1280 描述:Linux kernel是美國Linux基金會的開源操作系統Linux所使用的內核。Linux kernel存在安全漏洞,該漏洞源于drivers/gpu/drm/drm_lease.c的drm_lease_held中發現了一個釋放后重用漏洞。本地攻擊者利用該漏洞導致拒絕服務 (DoS) 或內核信息泄漏。 ·CVE-2022-21123 描述:Microsoft Windows是美國微軟(Microsoft)公司的一套個人設備使用的操作系統。Microsoft Windows存在安全漏洞。該漏洞源于Intel部分處理器存在安全問題。以下產品和版本受到影響:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for ARM64-based Systems,Windows Server 2019,Windows Server 2019 (Server Core installation),Windows 10 Version 21H1 for x64-based Systems,Windows 10 Version 21H1 for ARM64-based Systems,Windows 10 Version 21H1 for 32-bit Systems,Windows Server 2022,Windows Server 2022 (Server Core installation),Windows 10 Version 20H2 for x64-based Systems,Windows 10 Version 20H2 for 32-bit Systems,Windows 10 Version 20H2 for ARM64-based Systems,Windows Server, version 20H2 (Server Core Installation),Windows 11 for x64-based Systems,Windows 11 for ARM64-based Systems,Windows 10 Version 21H2 for 32-bit Systems,Windows 10 Version 21H2 for ARM64-based Systems,Windows 10 Version 21H2 for x64-based Systems,Windows 10 for 32-bit Systems,Windows 10 for x64-based Systems,Windows 10 Version 1607 for 32-bit Systems,Windows 10 Version 1607 for x64-based Systems,Windows Server 2016,Windows Server 2016 (Server Core installation),Windows 7 for 32-bit Systems Service Pack 1,Windows 7 for x64-based Systems Service Pack 1,Windows 8.1 for 32-bit systems,Windows 8.1 for x64-based systems,Windows RT 8.1,Windows Server 2008 for 32-bit Systems Service Pack 2,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems Service Pack 2,Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation),Windows Server 2008 R2 for x64-based Systems Service Pack 1,Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation),Windows Server 2012,Windows Server 2012 (Server Core installation),Windows Server 2012 R2,Windows Server 2012 R2 (Server Core installation) ·CVE-2022-21125 描述:Microsoft Windows是美國微軟(Microsoft)公司的一套個人設備使用的操作系統。Microsoft Windows存在安全漏洞。該漏洞源于Intel處理器存在安全問題。以下產品和版本受到影響:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for ARM64-based Systems,Windows Server 2019,Windows Server 2019 (Server Core installation),Windows 10 Version 21H1 for x64-based Systems,Windows 10 Version 21H1 for ARM64-based Systems,Windows 10 Version 21H1 for 32-bit Systems,Windows Server 2022,Windows Server 2022 (Server Core installation),Windows 10 Version 20H2 for x64-based Systems,Windows 10 Version 20H2 for 32-bit Systems,Windows 10 Version 20H2 for ARM64-based Systems,Windows Server, version 20H2 (Server Core Installation),Windows 11 for x64-based Systems,Windows 11 for ARM64-based Systems,Windows 10 Version 21H2 for 32-bit Systems,Windows 10 Version 21H2 for ARM64-based Systems,Windows 10 Version 21H2 for x64-based Systems,Windows 10 for 32-bit Systems,Windows 10 for x64-based Systems,Windows 10 Version 1607 for 32-bit Systems,Windows 10 Version 1607 for x64-based Systems,Windows Server 2016,Windows Server 2016 (Server Core installation),Windows 7 for 32-bit Systems Service Pack 1,Windows 7 for x64-based Systems Service Pack 1,Windows 8.1 for 32-bit systems,Windows 8.1 for x64-based systems,Windows RT 8.1,Windows Server 2008 for 32-bit Systems Service Pack 2,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems Service Pack 2,Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation),Windows Server 2008 R2 for x64-based Systems Service Pack 1,Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation),Windows Server 2012,Windows Server 2012 (Server Core installation),Windows Server 2012 R2,Windows Server 2012 R2 (Server Core installation) ·CVE-2022-21166 描述:Microsoft Windows是美國微軟(Microsoft)公司的一套個人設備使用的操作系統。Microsoft Windows 存在安全漏洞,該漏洞源于 Intel 部分處理器存在安全問題。以下產品和版本受到影響:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for ARM64-based Systems,Windows Server 2019,Windows Server 2019 (Server Core installation),Windows 10 Version 21H1 for x64-based Systems,Windows 10 Version 21H1 for ARM64-based Systems,Windows 10 Version 21H1 for 32-bit Systems,Windows Server 2022,Windows Server 2022 (Server Core installation),Windows 10 Version 20H2 for x64-based Systems,Windows 10 Version 20H2 for 32-bit Systems,Windows 10 Version 20H2 for ARM64-based Systems,Windows Server, version 20H2 (Server Core Installation),Windows 11 for x64-based Systems,Windows 11 for ARM64-based Systems,Windows 10 Version 21H2 for 32-bit Systems,Windows 10 Version 21H2 for ARM64-based Systems,Windows 10 Version 21H2 for x64-based Systems,Windows 10 for 32-bit Systems,Windows 10 for x64-based Systems,Windows 10 Version 1607 for 32-bit Systems,Windows 10 Version 1607 for x64-based Systems,Windows Server 2016,Windows Server 2016 (Server Core installation),Windows 7 for 32-bit Systems Service Pack 1,Windows 7 for x64-based Systems Service Pack 1,Windows 8.1 for 32-bit systems,Windows 8.1 for x64-based systems,Windows RT 8.1,Windows Server 2008 for 32-bit Systems Service Pack 2,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems Service Pack 2,Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation),Windows Server 2008 R2 for x64-based Systems Service Pack 1,Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation),Windows Server 2012,Windows Server 2012 (Server Core installation),Windows Server 2012 R2,Windows Server 2012 R2 (Server Core installation)。 ·CVE-2022-26373 描述:Intel Processors(英特爾處理器)是美國英特爾(Intel)公司的提供解釋計算機指令以及處理計算機軟件中的數據。Intel Processors存在安全漏洞,該漏洞源于上下文之間不透明地共享返回預測器目標,可能允許授權用戶通過本地訪問實現潛在的信息披露。 ·CVE-2022-2977 描述:None ·CVE-2022-2978 描述:Linux kernel是美國Linux基金會的開源操作系統Linux所使用的內核。Linux kernel NILFS文件系統存在安全漏洞,該漏洞源于用戶會引起security_inode_alloc對nilfs_mdt_destroy函數后續調用時造成釋放后重用,導致本地用戶可能使系統崩潰,或潛在地升級他們在系統上的權限。 ·CVE-2022-3202 描述:Linux kernel是美國Linux基金會的開源操作系統Linux所使用的內核。Linux kernel存在安全漏洞,該漏洞源于在Journaled File System (JFS)的fs/jfs/inode.c中的diFree存在空指針解引用缺陷。攻擊者利用該漏洞使系統崩潰或泄漏內核內部信息。 ·CVE-2022-40307 描述:Linux kernel是美國Linux基金會的開源操作系統Linux所使用的內核。Linux kernel 5.19.8之前的版本存在安全漏洞,該漏洞源于其drivers/firmware/efi/capsule-loader.c組件存在競爭條件導致釋放后重用。 2.受影響的軟件包 ·銀河麒麟高級服務器操作系統 V10 SP2 ·aarch64架構: bpftool、kernel、kernel-abi-whitelists、kernel-core、kernel-cross-headers、kernel-debug、kernel-debug-core、kernel-debug-devel、kernel-debug-modules、kernel-debug-modules-extra、kernel-debug-modules-internal、kernel-devel、kernel-headers、kernel-modules、kernel-modules-extra、kernel-modules-internal、kernel-tools、kernel-tools-libs、kernel-tools-libs-devel、perf、python3-perf ·x86_64架構: bpftool、kernel、kernel-abi-whitelists、kernel-core、kernel-cross-headers、kernel-debug、kernel-debug-core、kernel-debug-devel、kernel-debug-modules、kernel-debug-modules-extra、kernel-debug-modules-internal、kernel-devel、kernel-headers、kernel-ipaclones-internal、kernel-modules、kernel-modules-extra、kernel-modules-internal、kernel-tools、kernel-tools-libs、kernel-tools-libs-devel、perf、python3-perf 3.軟件包修復版本 ·銀河麒麟高級服務器操作系統 V10 SP2 (aarch64) bpftool-4.19.90-25.21.v2101.ky10或以上版本 kernel-4.19.90-25.21.v2101.ky10或以上版本 kernel-abi-whitelists-4.19.90-25.21.v2101.ky10或以上版本 kernel-core-4.19.90-25.21.v2101.ky10或以上版本 kernel-cross-headers-4.19.90-25.21.v2101.ky10或以上版本 kernel-debug-4.19.90-25.21.v2101.ky10或以上版本 kernel-debug-core-4.19.90-25.21.v2101.ky10或以上版本 kernel-debug-devel-4.19.90-25.21.v2101.ky10或以上版本 kernel-debug-modules-4.19.90-25.21.v2101.ky10或以上版本 kernel-debug-modules-extra-4.19.90-25.21.v2101.ky10或以上版本 kernel-debug-modules-internal-4.19.90-25.21.v2101.ky10或以上版本 kernel-devel-4.19.90-25.21.v2101.ky10或以上版本 kernel-headers-4.19.90-25.21.v2101.ky10或以上版本 kernel-modules-4.19.90-25.21.v2101.ky10或以上版本 kernel-modules-extra-4.19.90-25.21.v2101.ky10或以上版本 kernel-modules-internal-4.19.90-25.21.v2101.ky10或以上版本 kernel-tools-4.19.90-25.21.v2101.ky10或以上版本 kernel-tools-libs-4.19.90-25.21.v2101.ky10或以上版本 kernel-tools-libs-devel-4.19.90-25.21.v2101.ky10或以上版本 perf-4.19.90-25.21.v2101.ky10或以上版本 python3-perf-4.19.90-25.21.v2101.ky10或以上版本 ·銀河麒麟高級服務器操作系統 V10 SP2 (x86_64) bpftool-4.19.90-25.21.v2101.ky10或以上版本 kernel-4.19.90-25.21.v2101.ky10或以上版本 kernel-abi-whitelists-4.19.90-25.21.v2101.ky10或以上版本 kernel-core-4.19.90-25.21.v2101.ky10或以上版本 kernel-cross-headers-4.19.90-25.21.v2101.ky10或以上版本 kernel-debug-4.19.90-25.21.v2101.ky10或以上版本 kernel-debug-core-4.19.90-25.21.v2101.ky10或以上版本 kernel-debug-devel-4.19.90-25.21.v2101.ky10或以上版本 kernel-debug-modules-4.19.90-25.21.v2101.ky10或以上版本 kernel-debug-modules-extra-4.19.90-25.21.v2101.ky10或以上版本 kernel-debug-modules-internal-4.19.90-25.21.v2101.ky10或以上版本 kernel-devel-4.19.90-25.21.v2101.ky10或以上版本 kernel-headers-4.19.90-25.21.v2101.ky10或以上版本 kernel-ipaclones-internal-4.19.90-25.21.v2101.ky10或以上版本 kernel-modules-4.19.90-25.21.v2101.ky10或以上版本 kernel-modules-extra-4.19.90-25.21.v2101.ky10或以上版本 kernel-modules-internal-4.19.90-25.21.v2101.ky10或以上版本 kernel-tools-4.19.90-25.21.v2101.ky10或以上版本 kernel-tools-libs-4.19.90-25.21.v2101.ky10或以上版本 kernel-tools-libs-devel-4.19.90-25.21.v2101.ky10或以上版本 perf-4.19.90-25.21.v2101.ky10或以上版本 python3-perf-4.19.90-25.21.v2101.ky10或以上版本 4.修復方法 方法一:配置源進行升級安裝 1.打開軟件包源配置文件,根據倉庫地址進行修改。 倉庫源地址: 銀河麒麟高級服務器操作系統 V10 SP2 aarch64:https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/ x86_64:https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/ 2.配置完成后執行更新命令進行升級,命令如下: yum update Packagename 方法二:下載安裝包進行升級安裝 通過軟件包地址下載軟件包,使用軟件包升級命令根據受影響的軟件包 列表進行升級安裝, 命令如下: yum install Packagename 3.升級完成后是否需要重啟服務或操作系統: CVE-2021-26401:需要重啟操作系統以使漏洞修復生效。 CVE-2022-0001:需要重啟操作系統以使漏洞修復生效。 CVE-2022-0002:無需重啟操作系統與服務即可使漏洞修復生效。 CVE-2022-0480:無需重啟操作系統與服務即可使漏洞修復生效。 CVE-2022-0850:需要重啟 kernel 以使漏洞修復生效。 CVE-2022-1280:需要重啟操作系統以使漏洞修復生效。 CVE-2022-21123:需要重啟操作系統以使漏洞修復生效。 CVE-2022-21125:需要重啟操作系統以使漏洞修復生效。 CVE-2022-21166:需要重啟操作系統以使漏洞修復生效。 CVE-2022-26373:需要重啟操作系統以使漏洞修復生效。 CVE-2022-2977:需要重啟 kernel 以使漏洞修復生效。 CVE-2022-2978:需要重啟操作系統以使漏洞修復生效。 CVE-2022-3202:需要重啟操作系統以使漏洞修復生效。 CVE-2022-40307:需要重啟操作系統以使漏洞修復生效。 5.軟件包下載地址 ·銀河麒麟高級服務器操作系統 V10 SP2 kernel(aarch64)軟件包下載地址: https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/bpftool-4.19.90-25.21.v2101.ky10.aarch64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-4.19.90-25.21.v2101.ky10.aarch64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-abi-whitelists-4.19.90-25.21.v2101.ky10.aarch64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-core-4.19.90-25.21.v2101.ky10.aarch64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-cross-headers-4.19.90-25.21.v2101.ky10.aarch64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-debug-4.19.90-25.21.v2101.ky10.aarch64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-debug-core-4.19.90-25.21.v2101.ky10.aarch64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-debug-devel-4.19.90-25.21.v2101.ky10.aarch64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-debug-modules-4.19.90-25.21.v2101.ky10.aarch64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-debug-modules-extra-4.19.90-25.21.v2101.ky10.aarch64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-debug-modules-internal-4.19.90-25.21.v2101.ky10.aarch64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-devel-4.19.90-25.21.v2101.ky10.aarch64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-headers-4.19.90-25.21.v2101.ky10.aarch64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-modules-4.19.90-25.21.v2101.ky10.aarch64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-modules-extra-4.19.90-25.21.v2101.ky10.aarch64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-modules-internal-4.19.90-25.21.v2101.ky10.aarch64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-tools-4.19.90-25.21.v2101.ky10.aarch64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-tools-libs-4.19.90-25.21.v2101.ky10.aarch64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-tools-libs-devel-4.19.90-25.21.v2101.ky10.aarch64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/perf-4.19.90-25.21.v2101.ky10.aarch64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/python3-perf-4.19.90-25.21.v2101.ky10.aarch64.rpm kernel(x86_64)軟件包下載地址: https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/bpftool-4.19.90-25.21.v2101.ky10.x86_64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-4.19.90-25.21.v2101.ky10.x86_64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-abi-whitelists-4.19.90-25.21.v2101.ky10.x86_64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-core-4.19.90-25.21.v2101.ky10.x86_64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-cross-headers-4.19.90-25.21.v2101.ky10.x86_64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-debug-4.19.90-25.21.v2101.ky10.x86_64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-debug-core-4.19.90-25.21.v2101.ky10.x86_64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-debug-devel-4.19.90-25.21.v2101.ky10.x86_64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-debug-modules-4.19.90-25.21.v2101.ky10.x86_64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-debug-modules-extra-4.19.90-25.21.v2101.ky10.x86_64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-debug-modules-internal-4.19.90-25.21.v2101.ky10.x86_64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-devel-4.19.90-25.21.v2101.ky10.x86_64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-headers-4.19.90-25.21.v2101.ky10.x86_64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-ipaclones-internal-4.19.90-25.21.v2101.ky10.x86_64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-modules-4.19.90-25.21.v2101.ky10.x86_64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-modules-extra-4.19.90-25.21.v2101.ky10.x86_64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-modules-internal-4.19.90-25.21.v2101.ky10.x86_64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-tools-4.19.90-25.21.v2101.ky10.x86_64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-tools-libs-4.19.90-25.21.v2101.ky10.x86_64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-tools-libs-devel-4.19.90-25.21.v2101.ky10.x86_64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/perf-4.19.90-25.21.v2101.ky10.x86_64.rpm https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/python3-perf-4.19.90-25.21.v2101.ky10.x86_64.rpm 注:其他相關依賴包請到相同目錄下載 6.修復驗證 使用軟件包查詢命令,查看相關軟件包版本是否與修復版本一致,如果版本一致,則說明修復成功。 sudo rpm -qa | grep Packagename
    上一篇: KYSA-202303-1055 下一篇: KYSA-202305-1026

    試用

    服務

    動態

    聯系

    公啊灬啊灬啊灬快灬深用力视频