公告ID(KYSA-202306-1060)
公告ID:KYSA-202306-1060
公告摘要:kernel安全漏洞
等級:Important
發布日期:2023-06-27
詳細介紹
1.修復的CVE
·CVE-2022-27672
描述:When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure.
·CVE-2022-4744
描述:在Linux內核的TUN/TAP設備驅動程序功能中發現了一個雙重免費缺陷,即當register_netdevice函數(NETDEV_register通知程序)失敗時,用戶如何注冊設備。此缺陷允許本地用戶崩潰或可能升級其在系統上的權限。
·CVE-2023-0266
描述:在Linux內核的sound/core/control.c中的ALSA子系統中發現了一個釋放后使用的缺陷。此漏洞允許本地攻擊者導致釋放后使用問題。
·CVE-2023-0458
描述:A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the rlim variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 or commit?739790605705ddcf18f21782b9c99ad7d53a8c11
·CVE-2023-0459
描述:No description is available for this CVE.
·CVE-2023-1611
描述:A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea
·CVE-2023-1838
描述:由于雙重fget,在Linux內核中virtio網絡子組件的drivers/vhost/net.c中的vhost_net_set_backend中發現了一個釋放后使用缺陷。此問題可能使本地攻擊者使系統崩潰,并可能導致內核信息泄漏問題。
·CVE-2023-2002
描述:A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication.
·CVE-2023-20938
描述:在bind .c的binder_transaction_buffer_release中,由于不恰當的輸入驗證,可能會在free之后使用。這可能導致本地權限升級,而不需要額外的執行權限。利用此漏洞不需要用戶交互。
·CVE-2023-2162
描述:A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.
·CVE-2023-2194
描述:An out-of-bounds write vulnerability was found in the Linux kernel s SLIMpro I2C device driver. The userspace data->block[0] variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution.
·CVE-2023-2248
描述:An out-of-bounds memory access flaw was found in the Linux kernel’s traffic control (QoS) subsystem in how a user triggers the qfq_change_class function with an incorrect MTU value of the network device used as lmax. This flaw allows a local user to crash or potentially escalate their privileges on the system.
·CVE-2023-2269
描述:在Linux內核中發現一個缺陷,導致拒絕服務。出現此問題的原因可能是遞歸鎖定場景,導致Linux內核設備映射器多路徑子組件drivers/md/dm ioctl.c中的table_clear出現死鎖。
·CVE-2023-30772
描述:The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device.
2.受影響的軟件包
·銀河麒麟高級服務器操作系統 V10 SP2
·aarch64架構:
bpftool、kernel、kernel-abi-whitelists、kernel-core、kernel-cross-headers、kernel-debug、kernel-debug-core、kernel-debug-devel、kernel-debug-modules、kernel-debug-modules-extra、kernel-debug-modules-internal、kernel-devel、kernel-headers、kernel-modules、kernel-modules-extra、kernel-modules-internal、kernel-tools、kernel-tools-libs、kernel-tools-libs-devel、perf、python3-perf
·x86_64架構:
bpftool、kernel、kernel-abi-whitelists、kernel-core、kernel-cross-headers、kernel-debug、kernel-debug-core、kernel-debug-devel、kernel-debug-modules、kernel-debug-modules-extra、kernel-debug-modules-internal、kernel-devel、kernel-headers、kernel-ipaclones-internal、kernel-modules、kernel-modules-extra、kernel-modules-internal、kernel-tools、kernel-tools-libs、kernel-tools-libs-devel、perf、python3-perf
3.軟件包修復版本
·銀河麒麟高級服務器操作系統 V10 SP2 (aarch64)
bpftool-4.19.90-25.27.v2101.ky10或以上版本
kernel-4.19.90-25.27.v2101.ky10或以上版本
kernel-abi-whitelists-4.19.90-25.27.v2101.ky10或以上版本
kernel-core-4.19.90-25.27.v2101.ky10或以上版本
kernel-cross-headers-4.19.90-25.27.v2101.ky10或以上版本
kernel-debug-4.19.90-25.27.v2101.ky10或以上版本
kernel-debug-core-4.19.90-25.27.v2101.ky10或以上版本
kernel-debug-devel-4.19.90-25.27.v2101.ky10或以上版本
kernel-debug-modules-4.19.90-25.27.v2101.ky10或以上版本
kernel-debug-modules-extra-4.19.90-25.27.v2101.ky10或以上版本
kernel-debug-modules-internal-4.19.90-25.27.v2101.ky10或以上版本
kernel-devel-4.19.90-25.27.v2101.ky10或以上版本
kernel-headers-4.19.90-25.27.v2101.ky10或以上版本
kernel-modules-4.19.90-25.27.v2101.ky10或以上版本
kernel-modules-extra-4.19.90-25.27.v2101.ky10或以上版本
kernel-modules-internal-4.19.90-25.27.v2101.ky10或以上版本
kernel-tools-4.19.90-25.27.v2101.ky10或以上版本
kernel-tools-libs-4.19.90-25.27.v2101.ky10或以上版本
kernel-tools-libs-devel-4.19.90-25.27.v2101.ky10或以上版本
perf-4.19.90-25.27.v2101.ky10或以上版本
python3-perf-4.19.90-25.27.v2101.ky10或以上版本
·銀河麒麟高級服務器操作系統 V10 SP2 (x86_64)
bpftool-4.19.90-25.27.v2101.ky10或以上版本
kernel-4.19.90-25.27.v2101.ky10或以上版本
kernel-abi-whitelists-4.19.90-25.27.v2101.ky10或以上版本
kernel-core-4.19.90-25.27.v2101.ky10或以上版本
kernel-cross-headers-4.19.90-25.27.v2101.ky10或以上版本
kernel-debug-4.19.90-25.27.v2101.ky10或以上版本
kernel-debug-core-4.19.90-25.27.v2101.ky10或以上版本
kernel-debug-devel-4.19.90-25.27.v2101.ky10或以上版本
kernel-debug-modules-4.19.90-25.27.v2101.ky10或以上版本
kernel-debug-modules-extra-4.19.90-25.27.v2101.ky10或以上版本
kernel-debug-modules-internal-4.19.90-25.27.v2101.ky10或以上版本
kernel-devel-4.19.90-25.27.v2101.ky10或以上版本
kernel-headers-4.19.90-25.27.v2101.ky10或以上版本
kernel-ipaclones-internal-4.19.90-25.27.v2101.ky10或以上版本
kernel-modules-4.19.90-25.27.v2101.ky10或以上版本
kernel-modules-extra-4.19.90-25.27.v2101.ky10或以上版本
kernel-modules-internal-4.19.90-25.27.v2101.ky10或以上版本
kernel-tools-4.19.90-25.27.v2101.ky10或以上版本
kernel-tools-libs-4.19.90-25.27.v2101.ky10或以上版本
kernel-tools-libs-devel-4.19.90-25.27.v2101.ky10或以上版本
perf-4.19.90-25.27.v2101.ky10或以上版本
python3-perf-4.19.90-25.27.v2101.ky10或以上版本
4.修復方法
方法一:配置源進行升級安裝
1.打開軟件包源配置文件,根據倉庫地址進行修改。
倉庫源地址:
銀河麒麟高級服務器操作系統 V10 SP2
aarch64:https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/
x86_64:https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/
2.配置完成后執行更新命令進行升級,命令如下:
yum update Packagename
方法二:下載安裝包進行升級安裝
通過軟件包地址下載軟件包,使用軟件包升級命令根據受影響的軟件包
列表進行升級安裝, 命令如下:
yum install Packagename
3.升級完成后是否需要重啟服務或操作系統:
CVE-2022-27672:需要重啟操作系統以使漏洞修復生效。
CVE-2022-4744:無需重啟操作系統與服務即可使漏洞修復生效。
CVE-2023-0266:無需重啟操作系統與服務即可使漏洞修復生效。
CVE-2023-0458:需要重啟操作系統以使漏洞修復生效。
CVE-2023-0459:需要重啟操作系統以使漏洞修復生效。
CVE-2023-1611:需要重啟操作系統以使漏洞修復生效。
CVE-2023-1838:無需重啟操作系統與服務即可使漏洞修復生效。
CVE-2023-2002:需要重啟操作系統以使漏洞修復生效。
CVE-2023-20938:無需重啟操作系統與服務即可使漏洞修復生效。
CVE-2023-2162:需要重啟操作系統以使漏洞修復生效。
CVE-2023-2194:需要重啟操作系統以使漏洞修復生效。
CVE-2023-2248:需要重啟操作系統以使漏洞修復生效。
CVE-2023-2269:無需重啟操作系統與服務即可使漏洞修復生效。
CVE-2023-30772:需要重啟操作系統以使漏洞修復生效。
5.軟件包下載地址
·銀河麒麟高級服務器操作系統 V10 SP2
kernel(aarch64)軟件包下載地址:
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/bpftool-4.19.90-25.27.v2101.ky10.aarch64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-4.19.90-25.27.v2101.ky10.aarch64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-abi-whitelists-4.19.90-25.27.v2101.ky10.aarch64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-core-4.19.90-25.27.v2101.ky10.aarch64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-cross-headers-4.19.90-25.27.v2101.ky10.aarch64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-debug-4.19.90-25.27.v2101.ky10.aarch64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-debug-core-4.19.90-25.27.v2101.ky10.aarch64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-debug-devel-4.19.90-25.27.v2101.ky10.aarch64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-debug-modules-4.19.90-25.27.v2101.ky10.aarch64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-debug-modules-extra-4.19.90-25.27.v2101.ky10.aarch64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-debug-modules-internal-4.19.90-25.27.v2101.ky10.aarch64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-devel-4.19.90-25.27.v2101.ky10.aarch64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-headers-4.19.90-25.27.v2101.ky10.aarch64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-modules-4.19.90-25.27.v2101.ky10.aarch64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-modules-extra-4.19.90-25.27.v2101.ky10.aarch64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-modules-internal-4.19.90-25.27.v2101.ky10.aarch64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-tools-4.19.90-25.27.v2101.ky10.aarch64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-tools-libs-4.19.90-25.27.v2101.ky10.aarch64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/kernel-tools-libs-devel-4.19.90-25.27.v2101.ky10.aarch64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/perf-4.19.90-25.27.v2101.ky10.aarch64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/aarch64/Packages/python3-perf-4.19.90-25.27.v2101.ky10.aarch64.rpm
kernel(x86_64)軟件包下載地址:
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/bpftool-4.19.90-25.27.v2101.ky10.x86_64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-4.19.90-25.27.v2101.ky10.x86_64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-abi-whitelists-4.19.90-25.27.v2101.ky10.x86_64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-core-4.19.90-25.27.v2101.ky10.x86_64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-cross-headers-4.19.90-25.27.v2101.ky10.x86_64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-debug-4.19.90-25.27.v2101.ky10.x86_64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-debug-core-4.19.90-25.27.v2101.ky10.x86_64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-debug-devel-4.19.90-25.27.v2101.ky10.x86_64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-debug-modules-4.19.90-25.27.v2101.ky10.x86_64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-debug-modules-extra-4.19.90-25.27.v2101.ky10.x86_64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-debug-modules-internal-4.19.90-25.27.v2101.ky10.x86_64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-devel-4.19.90-25.27.v2101.ky10.x86_64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-headers-4.19.90-25.27.v2101.ky10.x86_64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-ipaclones-internal-4.19.90-25.27.v2101.ky10.x86_64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-modules-4.19.90-25.27.v2101.ky10.x86_64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-modules-extra-4.19.90-25.27.v2101.ky10.x86_64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-modules-internal-4.19.90-25.27.v2101.ky10.x86_64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-tools-4.19.90-25.27.v2101.ky10.x86_64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-tools-libs-4.19.90-25.27.v2101.ky10.x86_64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/kernel-tools-libs-devel-4.19.90-25.27.v2101.ky10.x86_64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/perf-4.19.90-25.27.v2101.ky10.x86_64.rpm
https://update.cs2c.com.cn/NS/V10/V10SP2/os/adv/lic/updates/x86_64/Packages/python3-perf-4.19.90-25.27.v2101.ky10.x86_64.rpm
注:其他相關依賴包請到相同目錄下載
6.修復驗證
使用軟件包查詢命令,查看相關軟件包版本是否與修復版本一致,如果版本一致,則說明修復成功。
sudo rpm -qa | grep Packagename