From 64143ff4ed24bec0626a7f3b4b8691378a8c2d65 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 4 Feb 2024 15:00:27 +0000 Subject: [PATCH] Auto-Update: 2024-02-04T15:00:24.182702+00:00 --- CVE-2023/CVE-2023-62xx/CVE-2023-6240.json | 67 +++++++++++++++++++++++ README.md | 13 ++--- 2 files changed, 73 insertions(+), 7 deletions(-) create mode 100644 CVE-2023/CVE-2023-62xx/CVE-2023-6240.json diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6240.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6240.json new file mode 100644 index 00000000000..baf906218b9 --- /dev/null +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6240.json @@ -0,0 +1,67 @@ +{ + "id": "CVE-2023-6240", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-02-04T14:15:47.787", + "lastModified": "2024-02-04T14:15:47.787", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A Marvin vulnerability side-channel leakage was found in the RSA decryption operation in the Linux Kernel. This issue may allow a network attacker to decrypt ciphertexts or forge signatures, limiting the services that use that private key." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-402" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2023-6240", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250843", + "source": "secalert@redhat.com" + }, + { + "url": "https://people.redhat.com/~hkario/marvin/", + "source": "secalert@redhat.com" + }, + { + "url": "https://securitypitfalls.wordpress.com/2023/10/16/experiment-with-side-channel-attacks-yourself/", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 11dd0ec4707..b7751b49ab4 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-02-04T13:00:24.742904+00:00 +2024-02-04T15:00:24.182702+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-02-04T11:15:09.087000+00:00 +2024-02-04T14:15:47.787000+00:00 ``` ### Last Data Feed Release @@ -29,21 +29,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -237511 +237512 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `1` +* [CVE-2023-6240](CVE-2023/CVE-2023-62xx/CVE-2023-6240.json) (`2024-02-04T14:15:47.787`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `0` -* [CVE-2022-26495](CVE-2022/CVE-2022-264xx/CVE-2022-26495.json) (`2024-02-04T11:15:08.227`) -* [CVE-2022-26496](CVE-2022/CVE-2022-264xx/CVE-2022-26496.json) (`2024-02-04T11:15:09.087`) ## Download and Usage