互联网技术 / 互联网资讯 · 2024年3月27日 0

Ubuntu Linux内核发现执行任意代码漏洞,建议尽快升级

Ubuntu是一个以桌面应用为主的linux操作系统。它是一个开放源代码的自由软件,提供了一个健壮、功能丰富的计算环境,既适合家庭使用又适用于商业环境。Ubuntu为全球数百个公司提供商业支持。

3月31日,Ubuntu发布了安全更新,修复了Linux内核发现的执行任意代码漏洞。以下是漏洞详情:

漏洞详情

来源:https://Ubuntu.coM/security/notices/LSN-0085-1

1.CVE-2022-1055 严重程度:高

Linux内核中的网络流量控制实现包含一个use-afteR-free漏洞。本地攻击者可以使用它来导致拒绝服务(系统崩溃)或可能执行任意代码

2.CVE-2022-27666 严重程度:中

linux 内核中的 IPsec 实现在执行 ESP 转换时没有正确分配足够的内存,导致基于堆的缓冲区溢出。本地攻击者可以使用它来导致拒绝服务(系统崩溃)或可能执行任意代码。

受影响产品和版本

上述漏洞影响Ubuntu 21.10, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS

解决方案

可以通过将系统更新到以下软件包版本来纠正该问题:

Ubuntu 21.10

linux-image-5.13.0-1021-aws – 5.13.0-1021.23

linux-image-5.13.0-1023-gCP – 5.13.0-1023.28

linux-image-virtual – 5.13.0.39.48

linux-image-geneRic-64k – 5.13.0.39.48

linux-image-geneRic – 5.13.0.39.48

linux-image-aws – 5.13.0.1021.22

linux-image-5.13.0-39-geneRic-lpae – 5.13.0-39.44

linux-image-5.13.0-39-geneRic – 5.13.0-39.44

linux-image-5.13.0-1020-kvM – 5.13.0-1020.21

linux-image-5.13.0-39-geneRic-64k – 5.13.0-39.44

linux-image-5.13.0-39-lowlatency – 5.13.0-39.44

linux-image-oeM-20.04 – 5.13.0.39.48

linux-image-gke – 5.13.0.1023.21

linux-image-gCP – 5.13.0.1023.21

linux-image-oRacle – 5.13.0.1025.25

linux-image-5.13.0-1025-oRacle – 5.13.0-1025.30

linux-image-kvM – 5.13.0.1020.20

linux-image-geneRic-lpae – 5.13.0.39.48

linux-image-lowlatency – 5.13.0.39.48

Ubuntu 20.04

linux-image-virtual – 5.4.0.107.111

linux-image-virtual-hwe-20.04 – 5.13.0.39.44~20.04.24

linux-image-geneRic – 5.4.0.107.111

linux-image-oeM – 5.4.0.107.111

linux-image-lowlatency-hwe-20.04 – 5.13.0.39.44~20.04.24

linux-image-5.4.0-107-geneRic-lpae – 5.4.0-107.121

linux-image-5.13.0-39-geneRic-lpae – 5.13.0-39.44~20.04.1

linux-image-5.4.0-107-lowlatency – 5.4.0-107.121

linux-image-5.13.0-39-geneRic – 5.13.0-39.44~20.04.1

linux-image-5.4.0-1061-kvM – 5.4.0-1061.64

linux-image-azuRe-lts-20.04 – 5.4.0.1074.72

linux-image-5.13.0-39-geneRic-64k – 5.13.0-39.44~20.04.1

linux-image-5.13.0-39-lowlatency – 5.13.0-39.44~20.04.1

linux-image-geneRic-hwe-20.04 – 5.13.0.39.44~20.04.24

linux-image-5.4.0-1069-oRacle – 5.4.0-1069.75

linux-image-aws-lts-20.04 – 5.4.0.1071.73

linux-image-5.4.0-1074-azuRe – 5.4.0-1074.77

linux-image-5.4.0-107-geneRic – 5.4.0-107.121

linux-image-oeM-osp1 – 5.4.0.107.111

linux-image-geneRic-64k-hwe-20.04 – 5.13.0.39.44~20.04.24

linux-image-oRacle-lts-20.04 – 5.4.0.1069.69

linux-image-geneRic-lpae-hwe-20.04 – 5.13.0.39.44~20.04.24

linux-image-5.4.0-1071-aws – 5.4.0-1071.76

linux-image-kvM – 5.4.0.1061.60

linux-image-geneRic-lpae – 5.4.0.107.111

linux-image-lowlatency – 5.4.0.107.111

Ubuntu 18.04

linux-image-geneRic-hwe-18.04 – 5.4.0.107.121~18.04.92

linux-image-snapdRagon-hwe-18.04 – 5.4.0.107.121~18.04.92

linux-image-oeM – 5.4.0.107.121~18.04.92

linux-image-5.4.0-107-geneRic-lpae – 5.4.0-107.121~18.04.1

linux-image-geneRic-lpae-hwe-18.04 – 5.4.0.107.121~18.04.92

linux-image-5.4.0-107-lowlatency – 5.4.0-107.121~18.04.1

linux-image-5.4.0-1069-oRacle – 5.4.0-1069.75~18.04.1

linux-image-virtual-hwe-18.04 – 5.4.0.107.121~18.04.92

linux-image-5.4.0-107-geneRic – 5.4.0-107.121~18.04.1

linux-image-oeM-osp1 – 5.4.0.107.121~18.04.92

linux-image-oRacle – 5.4.0.1069.75~18.04.48

linux-image-lowlatency-hwe-18.04 – 5.4.0.107.121~18.04.92

查看更多漏洞信息 以及升级请访问官网:

https://Ubuntu.coM/security/cve