2023-06-28 22:00:35 +00:00
{
"id" : "CVE-2023-3090" ,
"sourceIdentifier" : "cve-coordination@google.com" ,
"published" : "2023-06-28T20:15:09.693" ,
2024-06-26 16:03:11 +00:00
"lastModified" : "2024-06-26T15:54:02.870" ,
2023-10-29 09:06:41 +00:00
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-06-28 22:00:35 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation.\n\nThe out-of-bounds write is caused by missing skb->cb initialization in the ipvlan network driver. The vulnerability is reachable if\u00a0CONFIG_IPVLAN is enabled.\n\n\nWe recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.\n\n"
2023-10-11 20:00:28 +00:00
} ,
{
"lang" : "es" ,
"value" : "Una vulnerabilidad de escritura fuera de los l\u00edmites de la memoria en el controlador de red ipvlan del kernel de Linux se puede explotar para lograr la escalada de privilegios locales. La escritura fuera de los l\u00edmites se debe a la falta de inicializaci\u00f3n skb->cb en el controlador de red ipvlan. La vulnerabilidad es accesible si CONFIG_IPVLAN est\u00e1 habilitada. Recomendamos actualizar al anterior commit 90cbed5247439a966b645b34eb0a2e037836ea8e.\n"
2023-06-28 22:00:35 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-07-06 18:00:39 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
} ,
2023-06-28 22:00:35 +00:00
{
"source" : "cve-coordination@google.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
2023-07-06 18:00:39 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-787"
}
]
} ,
2023-06-28 22:00:35 +00:00
{
"source" : "cve-coordination@google.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-787"
}
]
}
] ,
2023-07-06 18:00:39 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "3.19" ,
2024-06-26 16:03:11 +00:00
"versionEndExcluding" : "4.14.316" ,
"matchCriteriaId" : "4532FA63-E660-44C3-BADA-3C9128842411"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.15" ,
"versionEndExcluding" : "4.19.284" ,
"matchCriteriaId" : "9112EE64-11F4-46DB-A041-95118F20F81B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.20" ,
"versionEndExcluding" : "5.4.244" ,
"matchCriteriaId" : "79F47095-8BA3-495A-AED3-2CCA5F2838E6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "5.5" ,
"versionEndExcluding" : "5.10.181" ,
"matchCriteriaId" : "F5B1726B-45AA-47F2-9261-6DC963E92248"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "5.11" ,
"versionEndExcluding" : "5.15.113" ,
"matchCriteriaId" : "F3D5E1B5-AB9D-4ECC-8F11-F3E1BF761E27"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "5.16" ,
"versionEndExcluding" : "6.1.30" ,
"matchCriteriaId" : "E9430E62-03EA-42E6-9E5E-BD1D5124D107"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.2" ,
"versionEndExcluding" : "6.3.4" ,
"matchCriteriaId" : "26C54BF0-3EED-46D4-92A7-5F07F658B49B"
2023-07-06 18:00:39 +00:00
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
2023-10-29 09:06:41 +00:00
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FA6FEEC2-9F11-4643-8827-749718254FED"
} ,
2023-07-06 18:00:39 +00:00
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
}
]
}
]
}
] ,
2023-06-28 22:00:35 +00:00
"references" : [
2023-09-11 20:00:29 +00:00
{
"url" : "http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html" ,
2023-10-29 09:06:41 +00:00
"source" : "cve-coordination@google.com" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
2023-09-11 20:00:29 +00:00
} ,
2023-10-11 20:00:28 +00:00
{
"url" : "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html" ,
2023-10-29 09:06:41 +00:00
"source" : "cve-coordination@google.com" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
2023-10-11 20:00:28 +00:00
} ,
2023-06-28 22:00:35 +00:00
{
"url" : "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=90cbed5247439a966b645b34eb0a2e037836ea8e" ,
2023-07-06 18:00:39 +00:00
"source" : "cve-coordination@google.com" ,
"tags" : [
"Exploit" ,
"Mailing List" ,
"Patch"
]
2023-06-28 22:00:35 +00:00
} ,
{
"url" : "https://kernel.dance/90cbed5247439a966b645b34eb0a2e037836ea8e" ,
2023-07-06 18:00:39 +00:00
"source" : "cve-coordination@google.com" ,
"tags" : [
"Patch"
]
2023-07-06 06:00:29 +00:00
} ,
2023-07-27 22:00:30 +00:00
{
"url" : "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html" ,
2023-10-29 09:06:41 +00:00
"source" : "cve-coordination@google.com" ,
"tags" : [
"Mailing List"
]
} ,
{
"url" : "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html" ,
"source" : "cve-coordination@google.com" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
2023-07-27 22:00:30 +00:00
} ,
2023-07-31 22:00:31 +00:00
{
"url" : "https://security.netapp.com/advisory/ntap-20230731-0002/" ,
2023-10-29 09:06:41 +00:00
"source" : "cve-coordination@google.com" ,
"tags" : [
"Third Party Advisory"
]
2023-07-31 22:00:31 +00:00
} ,
2023-07-06 06:00:29 +00:00
{
"url" : "https://www.debian.org/security/2023/dsa-5448" ,
2023-07-06 18:00:39 +00:00
"source" : "cve-coordination@google.com" ,
"tags" : [
"Third Party Advisory"
]
2023-08-19 20:00:32 +00:00
} ,
{
"url" : "https://www.debian.org/security/2023/dsa-5480" ,
2023-10-29 09:06:41 +00:00
"source" : "cve-coordination@google.com" ,
"tags" : [
"Third Party Advisory"
]
2023-06-28 22:00:35 +00:00
}
]
}