¡¸Îó²îͨ¸æ¡¹Linux Kernel ÐÅÏ¢×ß©&ȨÏÞÌáÉýÎó²î£¨CVE-2020-8835£©
2020-03-31
Ò»¡¢Îó²î¸ÅÊö
3ÔÂ31ÈÕ£¬Ñ¡ÊÖManfred PaulÔÚPwn2Own½ÇÖðÉÏÓÃÓÚÑÝʾLinuxÄÚºËȨÏÞÌáÉýµÄÎó²î±»CVEÊÕ¼£¬Îó²î±àºÅΪCVE-2020-8835¡£´ËÎó²îÓÉÓÚbpfÑé֤ϵͳÔÚLinuxÄÚºËÖÐûÓÐ׼ȷÅÌËãijЩ²Ù×÷µÄ¼Ä´æÆ÷ÏÞÖÆ£¬µ¼ÖÂÍâµØ¹¥»÷Õß¿ÉÒÔʹÓôËȱÏÝÔ½½ç¶ÁÈ¡ÉñÃØÐÅÏ¢(ÄÚºËÄÚ´æ)»ò½«Óû§ÌáÉýΪÖÎÀíȨÏÞ¡£ÇëÏà¹ØÓû§½ÓÄɲ½·¥¾ÙÐзÀ»¤¡£
²Î¿¼Á´½Ó£º
https://security-tracker.debian.org/tracker/CVE-2020-8835
https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8835.html
¶þ¡¢Ó°Ïì¹æÄ£
- Linux Kernel 5.4
- Linux Kernel 5.5
Èý¡¢Îó²î¼ì²â
°æ±¾¼ì²â
LinuxϵͳÓû§¿ÉÒÔͨ¹ýÉó²é°æÔÀ´ÅжÏÄ¿½ñϵͳÊÇ·ñÔÚÊÜÓ°Ïì¹æÄ£ÄÚ£¬Éó²é²Ù×÷ϵͳ°æ±¾ÐÅÏ¢ÏÂÁîÈçÏ£º
|
1
|
cat /proc/version
|

ËÄ¡¢Îó²î·À»¤
4.1 ¹Ù·½Éý¼¶
ÊÜÓ°ÏìÓû§¿Éͨ¹ýÉý¼¶LinuxϵͳÄں˵ķ½·¨¾ÙÐзÀ»¤£¬ÏÂÔØÁ´½Ó£º
https://github.com/torvalds/linux/releases
Debian bullseye ÊÜÓ°ÏìÐÅÏ¢Çë²éÔÄ£º
https://security-tracker.debian.org/tracker/CVE-2020-8835
Ubuntu¿¯ÐаæÏêÇéÐÅÏ¢Çë²éÔÄ£º
https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8835.html
4.2 ÔÝʱ·À»¤²½·¥
ÈôÏà¹ØÓû§ÔÝʱÎÞ·¨¸üÐÂLinux Kernel£¬¿É½ÓÄÉ¿¯ÐÐÉÌÌṩµÄ»º½â²½·¥£¬Í¨¹ýÐÞ¸ÄÄں˲ÎÊýÀ´¶ÔͨË×Óû§¾ÙÐÐÏÞÖÆ¡£
Ubuntu£º
½«kernel.unprivileged_bpf_disabled sysctlÉèÖÃΪ1
|
1
2
3
|
$ sudo sysctl kernel.unprivileged_bpf_disabled=1
$ echo kernel.unprivileged_bpf_disabled=1 | \
sudo tee /etc/sysctl.d/90-CVE-2020-8835.conf
|
ÔÚʹÓÃÇå¾²Ö¸µ¼µÄϵͳÉÏ£¬Õâ¸öÎÊÌâÒ²»á»ñµÃ»º½â¡£
Redhat£º
|
1
|
# sysctl -w kernel.unprivileged_bpf_disabled=1
|

AG¹«Ë¾ÔÆ







