cvelist/2023/6xxx/CVE-2023-6531.json

184 lines
8.3 KiB
JSON
Raw Normal View History

2023-12-05 19:00:34 +00:00
{
2024-01-21 11:00:35 +00:00
"data_version": "4.0",
2023-12-05 19:00:34 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-6531",
2024-01-21 11:00:35 +00:00
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
2023-12-05 19:00:34 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-01-21 11:00:35 +00:00
"value": "A use-after-free flaw was found in the Linux Kernel due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic() on the socket that the SKB is queued on."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
2024-09-06 18:00:33 +00:00
"value": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
"cweId": "CWE-362"
2024-01-21 11:00:35 +00:00
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
2024-04-30 14:00:35 +00:00
"product_name": "Red Hat Enterprise Linux 9",
2024-01-21 11:00:35 +00:00
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
2024-04-30 14:00:35 +00:00
"versions": [
{
"version": "0:5.14.0-427.13.1.el9_4",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:5.14.0-427.13.1.el9_4",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
2024-01-21 11:00:35 +00:00
}
}
]
}
},
{
2024-04-30 14:00:35 +00:00
"product_name": "Red Hat Enterprise Linux 6",
2024-01-21 11:00:35 +00:00
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unaffected"
}
}
]
}
},
{
2024-04-30 14:00:35 +00:00
"product_name": "Red Hat Enterprise Linux 7",
2024-01-21 11:00:35 +00:00
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unaffected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unaffected"
}
}
]
}
},
{
2024-04-30 14:00:35 +00:00
"product_name": "Red Hat Enterprise Linux 8",
2024-01-21 11:00:35 +00:00
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
2024-04-30 14:00:35 +00:00
"defaultStatus": "unaffected"
2024-01-21 11:00:35 +00:00
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
2024-04-30 14:00:35 +00:00
"defaultStatus": "unaffected"
2024-01-21 11:00:35 +00:00
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
2024-04-30 14:00:35 +00:00
{
"url": "https://access.redhat.com/errata/RHSA-2024:2394",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:2394"
},
2024-01-21 11:00:35 +00:00
{
"url": "https://access.redhat.com/security/cve/CVE-2023-6531",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2023-6531"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253034",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2253034"
},
{
"url": "https://lore.kernel.org/all/c716c88321939156909cfa1bd8b0faaf1c804103.1701868795.git.asml.silence@gmail.com/",
"refsource": "MISC",
"name": "https://lore.kernel.org/all/c716c88321939156909cfa1bd8b0faaf1c804103.1701868795.git.asml.silence@gmail.com/"
}
]
},
"work_around": [
{
"lang": "en",
"value": "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
}
],
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
2023-12-05 19:00:34 +00:00
}
]
}
}