[{"data":1,"prerenderedAt":139},["ShallowReactive",2],{"zh-cn:CommonContent:\u002Fnews\u002F2026-05-20-cve-linux-kernel-and-postgresql":3},{"id":4,"title":5,"body":6,"categories":129,"date":131,"description":124,"extension":132,"home":133,"important":133,"meta":134,"navigation":133,"path":135,"seo":136,"stem":137,"__hash__":138},"zhCN\u002Fnews\u002F2026-05-20-cve-linux-kernel-and-postgresql.md","安全公告：Linux 内核及 PostgreSQL 高危漏洞",{"type":7,"value":8,"toc":123},"minimark",[9,17,20,25,36,39,71,74,78,81,98,111,114],[10,11,12],"p",{},[13,14],"img",{"alt":15,"src":16},"Linux 内核更新安全公告：本地提权漏洞（代号 Dirty Frag）","\u002Fassets\u002Fnews\u002Fcve-kernel-and-postgresql-20260520.webp",[10,18,19],{},"今日，我们针对 Linux 内核及 PostgreSQL 中发现的数个高危安全漏洞推送了更新，详情如下。",[21,22,24],"h2",{"id":23},"linux-内核本地提权漏洞-pintheft","Linux 内核：本地提权漏洞 (PinTheft)",[10,26,27,28,35],{},"2026 年 5 月 20 日，V12 安全团队披露了 Linux 内核 rds 模块中的一个本地提权漏洞（代号 ",[29,30,34],"a",{"href":31,"rel":32},"https:\u002F\u002Fgithub.com\u002Fv12-security\u002Fpocs\u002Ftree\u002Fmain\u002Fpintheft",[33],"nofollow","PinTheft","），可通过恶意程序实现本地提权。",[10,37,38],{},"目前我们已通过系统更新修补这一漏洞，请参考如下软件版本：",[40,41,42,54,62],"ul",{},[43,44,45,46,50,51],"li",{},"主线发行支持的设备：",[47,48,49],"code",{},"linux+kernel"," >= ",[47,52,53],{},"3:6.18.32",[43,55,56,57,50,60],{},"Apple silicon 设备：",[47,58,59],{},"linux+kernel+asahi",[47,61,53],{},[43,63,64,65,50,68],{},"树莓派（64 位）：",[47,66,67],{},"linux+kernel+rpi",[47,69,70],{},"6.18.32",[10,72,73],{},"请择机更新您的安同 OS（服务器、多用户或公用设备用户请加急此更新）。",[21,75,77],{"id":76},"postgresql数个高危漏洞","PostgreSQL：数个高危漏洞",[10,79,80],{},"此次 PostgreSQL 安全更新针对 14.23\u002F15.18\u002F16.14\u002F17.10\u002F18.4 共 5 个版本，共修复 11 个安全漏洞，其中包含如下 7 个高危漏洞：",[40,82,83,86,89,92,95],{},[43,84,85],{},"3 个 SQL 注入漏洞（CVE-2026-6476、CVE-2026-6637 及 CVE-2026-6638）",[43,87,88],{},"1 个内存覆写漏洞 (CVE-2026-6477)",[43,90,91],{},"1 个本地文件覆写漏洞 (CVE-2026-6475)",[43,93,94],{},"1 个整数溢出导致的越界写入漏洞 (CVE-2026-6473)",[43,96,97],{},"1 个无限递归导致的拒绝服务攻击漏洞 (CVE-2026-6479)",[10,99,100,104,105,110],{},[101,102,103],"b",{},"请注意：上游已于 2025 年 11 月正式停止 PostgreSQL 13 的支持，因此本次更新未推送针对 PostgreSQL 13 的修复，且已将此包移除。","此外，为了减小维护压力，我们决定在近期移除 PostgreSQL 14-16。如果您依旧在使用这些版本，请尽快迁移到 PostgreSQL 18。有关迁移步骤的指南请见 ",[29,106,109],{"href":107,"rel":108},"https:\u002F\u002Fwww.postgresql.org\u002Fdocs\u002Fcurrent\u002Fupgrading.html",[33],"PostgreSQL 官方文档","。",[10,112,113],{},"—",[10,115,116,117,122],{},"如果您在安装上述安全更新的过程中遇到问题，或对本安全公告有任何疑问或建议，欢迎您来社区",[29,118,121],{"href":119,"rel":120},"https:\u002F\u002Faosc.io\u002Fcontact",[33],"各聊天群组","与我们联系反馈。",{"title":124,"searchDepth":125,"depth":125,"links":126},"",2,[127,128],{"id":23,"depth":125,"text":24},{"id":76,"depth":125,"text":77},[130],"advisories","2026-05-20","md",true,{},"\u002Fnews\u002F2026-05-20-cve-linux-kernel-and-postgresql",{"title":5,"description":124},"news\u002F2026-05-20-cve-linux-kernel-and-postgresql","8Oo8WAySCnVfJ92nzLggMmJgXNr2GqZypbBxoHQux24",1779330601186]