安全公告/【CVE-2023-32559】
基本信息
漏洞描述
A privilege escalation vulnerability exists in the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. The use of the deprecated API `process.binding()` can bypass the policy mechanism by requiring internal modules and eventually take advantage of `process.binding('spawn_sync')` run arbitrary code, outside of the limits defined in a `policy.json` file. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.
修复方式
yum update PackageName
漏洞判定
执行命令yum info PackageName获取软件包版本号,版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复
参考
https://gitee.com/src-openeuler/nodejs/issues/I7V5KE
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32559
https://nvd.nist.gov/vuln/detail/CVE-2023-32559