2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2020-12659" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2020-05-05T07:15:11.057" ,
2024-11-23 13:10:58 +00:00
"lastModified" : "2024-11-21T05:00:00.760" ,
"vulnStatus" : "Modified" ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "An issue was discovered in the Linux kernel before 5.6.7. xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) because of a lack of headroom validation."
} ,
{
"lang" : "es" ,
"value" : "Se detect\u00f3 un problema en el kernel de Linux versiones anteriores a 5.6.7. En la funci\u00f3n xdp_umem_reg en el archivo net/xdp/xdp_umem.c se presenta una escritura fuera de l\u00edmites (por un usuario con la capacidad CAP_NET_ADMIN) debido a una falta de comprobaci\u00f3n del headroom."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" ,
2024-11-23 13:10:58 +00:00
"baseScore" : 6.7 ,
"baseSeverity" : "MEDIUM" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 0.8 ,
"impactScore" : 5.9
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C" ,
2024-11-23 13:10:58 +00:00
"baseScore" : 7.2 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "LOCAL" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-787"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
2024-02-01 00:55:28 +00:00
"versionStartIncluding" : "4.18" ,
"versionEndExcluding" : "4.19.118" ,
"matchCriteriaId" : "A297BA06-0F48-41A8-86AE-C59682E062FA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.20" ,
"versionEndExcluding" : "5.4.35" ,
"matchCriteriaId" : "D6EFF949-D686-4BFC-A1AC-AB04BFD2ABB4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "5.5" ,
2023-04-24 12:24:31 +02:00
"versionEndExcluding" : "5.6.7" ,
2024-02-01 00:55:28 +00:00
"matchCriteriaId" : "CA9191E1-E0BF-43FA-BE45-00A613F9B341"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*" ,
"matchCriteriaId" : "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5C2089EE-5D7F-47EC-8EA5-0F69790564C4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:hci_baseboard_management_controller:h300s:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "27227B35-932A-4035-B39F-6A455753C0D6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:hci_baseboard_management_controller:h410c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "489D20B9-166F-423D-8C48-A23D3026E33B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:hci_baseboard_management_controller:h410s:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A4AD592C-222D-4C6F-B176-8145A1A5AFEC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:hci_baseboard_management_controller:h500s:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8603654B-A8A9-4DEB-B0DD-C82E1C885749"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:hci_baseboard_management_controller:h610c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "78BE572F-45C1-467F-918F-FB1276F6B495"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:hci_baseboard_management_controller:h610s:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DE7C6010-F736-4BDA-9E3B-C4370BBFA149"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:hci_baseboard_management_controller:h615c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "646FFC2B-6DC4-4BD8-AAE0-81895D397700"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:hci_baseboard_management_controller:h700s:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C855C933-F271-45E6-8E85-8D7CF2EF1BE6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D6D700C5-F67F-4FFB-BE69-D524592A3D2E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E94F7F59-1785-493F-91A7-5F5EA5E87E4D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:netapp:aff_baseboard_management_controller:a700s:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "804B2D7C-D890-4C4C-8A76-1760552E11BC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "090AA6F4-4404-4E26-82AB-C3A22636F276"
2023-04-24 12:24:31 +02:00
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" ,
2024-02-01 00:55:28 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory" ,
"VDB Entry"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://bugzilla.kernel.org/show_bug.cgi?id=207225" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Issue Tracking" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.7" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99e3a236dd43d06c65af0a2ef9cb44306aef6e02" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://github.com/torvalds/linux/commit/99e3a236dd43d06c65af0a2ef9cb44306aef6e02" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://security.netapp.com/advisory/ntap-20200608-0001/" ,
2024-02-01 00:55:28 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://usn.ubuntu.com/4387-1/" ,
2024-02-01 00:55:28 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://usn.ubuntu.com/4388-1/" ,
2024-02-01 00:55:28 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://usn.ubuntu.com/4389-1/" ,
2024-02-01 00:55:28 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2024-11-23 13:10:58 +00:00
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "https://bugzilla.kernel.org/show_bug.cgi?id=207225" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Issue Tracking" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.7" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99e3a236dd43d06c65af0a2ef9cb44306aef6e02" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://github.com/torvalds/linux/commit/99e3a236dd43d06c65af0a2ef9cb44306aef6e02" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://security.netapp.com/advisory/ntap-20200608-0001/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/4387-1/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/4388-1/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/4389-1/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}