Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-3090

Опубликовано: 10 мая 2023
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation. The out-of-bounds write is caused by missing skb->cb initialization in the ipvlan network driver. The vulnerability is reachable if CONFIG_IPVLAN is enabled. We recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.

A flaw was found in the IPVLAN network driver in the Linux kernel. This issue is caused by missing skb->cb initialization in __ip_options_echo and can lead to an out-of-bounds write stack overflow. This may allow a local user to cause a denial of service or potentially achieve local privilege escalation.

Отчет

Red Hat Enterprise Linux 6 and 7 are not affected by this flaw as they did not include IPVLAN support.

Меры по смягчению последствий

This flaw can be mitigated by preventing the affected ipvlan kernel module from being loaded. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2023:525519.09.2023
Red Hat Enterprise Linux 8kpatch-patchFixedRHSA-2023:522119.09.2023
Red Hat Enterprise Linux 8kernelFixedRHSA-2023:524419.09.2023
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionskernelFixedRHSA-2023:451508.08.2023
Red Hat Enterprise Linux 8.1 Update Services for SAP Solutionskpatch-patchFixedRHSA-2023:451608.08.2023
Red Hat Enterprise Linux 8.2 Advanced Update SupportkernelFixedRHSA-2023:481529.08.2023
Red Hat Enterprise Linux 8.2 Telecommunications Update Servicekernel-rtFixedRHSA-2023:481729.08.2023

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2218672kernel: ipvlan: out-of-bounds write caused by unclear skb->cb

EPSS

Процентиль: 1%
0.00012
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 2 года назад

A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation. The out-of-bounds write is caused by missing skb->cb initialization in the ipvlan network driver. The vulnerability is reachable if CONFIG_IPVLAN is enabled. We recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.

CVSS3: 7.8
nvd
почти 2 года назад

A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation. The out-of-bounds write is caused by missing skb->cb initialization in the ipvlan network driver. The vulnerability is reachable if CONFIG_IPVLAN is enabled. We recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.

CVSS3: 7.8
msrc
почти 2 года назад

Описание отсутствует

CVSS3: 7.8
debian
почти 2 года назад

A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan ne ...

CVSS3: 7.8
github
почти 2 года назад

A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation. The out-of-bounds write is caused by missing skb->cb initialization in the ipvlan network driver. The vulnerability is reachable if CONFIG_IPVLAN is enabled. We recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.

EPSS

Процентиль: 1%
0.00012
Низкий

7.8 High

CVSS3