安全公告/【CVE-2023-3776】
基本信息
受影响操作系统:Asianux
危险等级:高危
影响源码包:kernel-4.19
CVSS评分:7.8
发现日期:2023-09-24
修复版本:4.19.0-91.82.152.10
漏洞描述
A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.
修复方式
yum update PackageName
漏洞判定
执行命令yum info PackageName获取软件包版本号,版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复
参考
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
https://nvd.nist.gov/vuln/detail/CVE-2023-3776