Ubuntu 高危漏洞 - V2EX
V2EX = way to explore
V2EX 是一个关于分享和探索的地方
Sign Up Now
For Existing Member  Sign In
lanhiy

Ubuntu 高危漏洞

  •  
  •   lanhiy 1h 21m ago 670 views
    [高危] CVE-2026-31431 ( Copy Fail )本地提权漏洞
    https://ubuntu.com/security/CVE-2026-31431

    一行命令就能从普通用户变成 root ,影响 2017 年至今几乎所有 Linux 发行版( Ubuntu 、Debian 、CentOS 、RHEL 等)

    修复方案
    执行各发行版 upgrade 命令,应已推送新的 linux-image-*
    sudo apt update && sudo apt upgrade

    紧急修补策略
    echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif-aead.conf
    rmmod algif_aead 2>/dev/null

    该漏洞利用门槛低、隐蔽性强(绕过文件完整性校验),建议优先评估并应用补丁。
    注:由于 page cache 内核全局共享,该漏洞可用于容器逃逸
    4 replies    2026-04-30 13:26:54 +08:00
    seWindows
        1
    seWindows  
       1h 2m ago
    我来补充一下受影响范围:

    Red Hat Enterprise ( centos ) 8
    Red Hat Enterprise ( centos ) 9
    Red Hat Enterprise ( centos ) 10

    ubuntu 18.04 LTS
    ubuntu 20.04 LTS
    ubuntu 22.04 LTS
    ubuntu 24.04 LTS
    ubuntu 25.10

    centos7 由于内核太老了,反而没有收到影响

    参考:
    https://access.redhat.com/security/cve/cve-2026-31431
    https://ubuntu.com/security/CVE-2026-31431#status

    linux kernel 对非特权用户暴露了一个 AF_ALG 的加密加速的 aead 接口,达到组合 AF_ALG 与 splice()来系统调用,利用此接口没有严格绑定 src 与 dst ,污染页内存
    vishun
        2
    vishun  
       59 mins ago
    ubuntu24 测试`sudo apt update && sudo apt upgrade`后还是会变 root 。
    vishun
        3
    vishun  
       56 mins ago
    还真是有用,执行楼主的 shell 的命令时提示`-bash: /etc/modprobe.d/disable-algif.conf: Permission denied`,直接先利用漏洞提升成 root ,然后再执行就成功了,然后成功临时堵住了漏洞。
    zenfsharp
        4
    zenfsharp  
       55 mins ago
    感谢,已更新
    About     Help     Advertise     Blog     API     FAQ     Solana     5743 Online   Highest 6679       Select Language
    创意工作者们的社区
    World is powered by solitude
    VERSION: 3.9.8.5 47ms UTC 06:22 PVG 14:22 LAX 23:22 JFK 02:22
    Do have faith in what you're doing.
    ubao msn snddm index pchome yahoo rakuten mypaper meadowduck bidyahoo youbao zxmzxm asda bnvcg cvbfg dfscv mmhjk xxddc yybgb zznbn ccubao uaitu acv GXCV ET GDG YH FG BCVB FJFH CBRE CBC GDG ET54 WRWR RWER WREW WRWER RWER SDG EW SF DSFSF fbbs ubao fhd dfg ewr dg df ewwr ewwr et ruyut utut dfg fgd gdfgt etg dfgt dfgd ert4 gd fgg wr 235 wer3 we vsdf sdf gdf ert xcv sdf rwer hfd dfg cvb rwf afb dfh jgh bmn lgh rty gfds cxv xcv xcs vdas fdf fgd cv sdf tert sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf shasha9178 shasha9178 shasha9178 shasha9178 shasha9178 liflif2 liflif2 liflif2 liflif2 liflif2 liblib3 liblib3 liblib3 liblib3 liblib3 zhazha444 zhazha444 zhazha444 zhazha444 zhazha444 dende5 dende denden denden2 denden21 fenfen9 fenf619 fen619 fenfe9 fe619 sdf sdf sdf sdf sdf zhazh90 zhazh0 zhaa50 zha90 zh590 zho zhoz zhozh zhozho zhozho2 lislis lls95 lili95 lils5 liss9 sdf0ty987 sdft876 sdft9876 sdf09876 sd0t9876 sdf0ty98 sdf0976 sdf0ty986 sdf0ty96 sdf0t76 sdf0876 df0ty98 sf0t876 sd0ty76 sdy76 sdf76 sdf0t76 sdf0ty9 sdf0ty98 sdf0ty987 sdf0ty98 sdf6676 sdf876 sd876 sd876 sdf6 sdf6 sdf9876 sdf0t sdf06 sdf0ty9776 sdf0ty9776 sdf0ty76 sdf8876 sdf0t sd6 sdf06 s688876 sd688 sdf86