安全公告/【CVE-2023-4194】

基本信息

漏洞名称:
受影响操作系统:Asianux
危险等级:中危
影响源码包:kernel-4.19
CVSS评分:5.5
发现日期:2023-09-25
修复版本:4.19.90-2305.1.0.0199.64

漏洞描述

A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ("tun: tun_chr_open(): correctly initialize socket uid"), - 66b2c338adce ("tap: tap_open(): correctly initialize socket uid"), pass "inode->i_uid" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.

修复方式

yum update PackageName

漏洞判定

执行命令yum info PackageName获取软件包版本号,版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复

补丁

参考

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
https://nvd.nist.gov/vuln/detail/CVE-2023-4194