cvelist/2023/39xxx/CVE-2023-39194.json

210 lines
9.8 KiB
JSON
Raw Normal View History

2023-07-25 17:00:33 +00:00
{
2023-10-09 18:00:37 +00:00
"data_version": "4.0",
2023-07-25 17:00:33 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-39194",
2023-10-09 18:00:37 +00:00
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
2023-07-25 17:00:33 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-10-09 18:00:37 +00:00
"value": "A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-bounds Read",
"cweId": "CWE-125"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
2024-05-22 17:00:34 +00:00
{
"product_name": "Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:4.18.0-553.rt7.342.el8_10",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:4.18.0-553.el8_10",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
2023-10-09 18:00:37 +00:00
{
2024-04-30 14:00:35 +00:00
"product_name": "Red Hat Enterprise Linux 9",
2023-10-09 18:00:37 +00:00
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
2024-04-30 14:00:35 +00:00
"versions": [
{
"version": "0:5.14.0-427.13.1.el9_4",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:5.14.0-427.13.1.el9_4",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
2023-10-09 18:00:37 +00:00
}
}
]
}
},
{
2024-04-30 14:00:35 +00:00
"product_name": "Red Hat Enterprise Linux 6",
2023-10-09 18:00:37 +00:00
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unaffected"
}
}
]
}
},
{
2024-04-30 14:00:35 +00:00
"product_name": "Red Hat Enterprise Linux 7",
2023-10-09 18:00:37 +00:00
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
2024-04-30 14:00:35 +00:00
"defaultStatus": "unaffected"
2023-10-09 18:00:37 +00:00
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
2024-04-30 14:00:35 +00:00
"defaultStatus": "unaffected"
2023-10-09 18:00:37 +00:00
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
2024-04-30 14:00:35 +00:00
{
"url": "https://access.redhat.com/errata/RHSA-2024:2394",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:2394"
},
2024-05-22 17:00:34 +00:00
{
"url": "https://access.redhat.com/errata/RHSA-2024:2950",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:2950"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:3138",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:3138"
},
2023-10-09 18:00:37 +00:00
{
"url": "https://access.redhat.com/security/cve/CVE-2023-39194",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2023-39194"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226788",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2226788"
},
2024-01-11 20:00:40 +00:00
{
2024-04-25 14:00:32 +00:00
"url": "https://www.zerodayinitiative.com/advisories/ZDI-CAN-18111/",
2024-01-11 20:00:40 +00:00
"refsource": "MISC",
2024-04-25 14:00:32 +00:00
"name": "https://www.zerodayinitiative.com/advisories/ZDI-CAN-18111/"
2023-10-09 18:00:37 +00:00
}
]
},
"work_around": [
{
"lang": "en",
"value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.2,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
2023-07-25 17:00:33 +00:00
}
]
}
}