安全公告/【CVE-2023-3609】

基本信息

漏洞名称:
受影响操作系统:Asianux
危险等级:高危
影响源码包:kernel-4.19
CVSS评分:7.8
发现日期:2023-09-24
修复版本:4.19.0-91.82.152.10

漏洞描述

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.

修复方式

yum update PackageName

漏洞判定

执行命令yum info PackageName获取软件包版本号,版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复

补丁

参考

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
https://nvd.nist.gov/vuln/detail/CVE-2023-3609