• CVE-2023-4194

发布时间: 2023年9月2日

修改时间: 2024年10月31日

概要

A flaw was found in the Linux kernel s TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ( tun: tun_chr_open(): correctly initialize socket uid ), - 66b2c338adce ( tap: tap_open(): correctly initialize socket uid ), pass inode->i_uid to sock_init_data_uid() as the last parameter and that turns out to not be accurate.

CVSS v3 指标

NVD openEuler
Confidentiality None None
Attack Vector Local Local
CVSS评分 5.5 5.5
Attack Complexity Low Low
Privileges Required Low Low
Scope Unchanged Unchanged
Integrity High High
User Interaction None None
Availability None None

安全公告

公告名 概要 发布时间
KylinSec-SA-2023-2249 kernel security update 2023年9月2日
KylinSec-SA-2023-2247 kernel security update 2023年9月2日

影响产品

产品 状态
KY3.4-4A kernel Fixed
KY3.4-5A kernel Fixed
KY3.5.1 kernel Fixed
KY3.5.2 kernel Fixed