CVE-2023-35788

An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.
References
Link Resource
http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2023/06/17/1 Exploit Mailing List
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.7 Mailing List Patch
https://git.kernel.org/linus/4d56304e5827c8cc8cc18c75343d283af7c4825c Patch
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20230714-0002/ Third Party Advisory
https://www.debian.org/security/2023/dsa-5448 Third Party Advisory
https://www.debian.org/security/2023/dsa-5480 Third Party Advisory
https://www.openwall.com/lists/oss-security/2023/06/07/1 Exploit Mailing List
http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2023/06/17/1 Exploit Mailing List
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.7 Mailing List Patch
https://git.kernel.org/linus/4d56304e5827c8cc8cc18c75343d283af7c4825c Patch
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20230714-0002/ Third Party Advisory
https://www.debian.org/security/2023/dsa-5448 Third Party Advisory
https://www.debian.org/security/2023/dsa-5480 Third Party Advisory
https://www.openwall.com/lists/oss-security/2023/06/07/1 Exploit Mailing List
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*

Configuration 8 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*

Configuration 9 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

21 Nov 2024, 08:08

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html - Third Party Advisory, VDB Entry
References () http://www.openwall.com/lists/oss-security/2023/06/17/1 - Exploit, Mailing List () http://www.openwall.com/lists/oss-security/2023/06/17/1 - Exploit, Mailing List
References () https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.7 - Mailing List, Patch () https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.7 - Mailing List, Patch
References () https://git.kernel.org/linus/4d56304e5827c8cc8cc18c75343d283af7c4825c - Patch () https://git.kernel.org/linus/4d56304e5827c8cc8cc18c75343d283af7c4825c - Patch
References () https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html - Mailing List, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20230714-0002/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20230714-0002/ - Third Party Advisory
References () https://www.debian.org/security/2023/dsa-5448 - Third Party Advisory () https://www.debian.org/security/2023/dsa-5448 - Third Party Advisory
References () https://www.debian.org/security/2023/dsa-5480 - Third Party Advisory () https://www.debian.org/security/2023/dsa-5480 - Third Party Advisory
References () https://www.openwall.com/lists/oss-security/2023/06/07/1 - Exploit, Mailing List () https://www.openwall.com/lists/oss-security/2023/06/07/1 - Exploit, Mailing List

19 Aug 2023, 18:16

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2023/dsa-5480 -

27 Jul 2023, 21:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html -

21 Jul 2023, 19:20

Type Values Removed Values Added
References (DEBIAN) https://www.debian.org/security/2023/dsa-5448 - (DEBIAN) https://www.debian.org/security/2023/dsa-5448 - Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20230714-0002/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20230714-0002/ - Third Party Advisory
CPE cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*

18 Jul 2023, 08:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20230714-0002/ -

06 Jul 2023, 04:15

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-787
References
  • (DEBIAN) https://www.debian.org/security/2023/dsa-5448 -
References (MISC) https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.7 - (MISC) https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.7 - Mailing List, Patch
References (MISC) https://git.kernel.org/linus/4d56304e5827c8cc8cc18c75343d283af7c4825c - (MISC) https://git.kernel.org/linus/4d56304e5827c8cc8cc18c75343d283af7c4825c - Patch
References (MLIST) http://www.openwall.com/lists/oss-security/2023/06/17/1 - (MLIST) http://www.openwall.com/lists/oss-security/2023/06/17/1 - Exploit, Mailing List
References (MISC) https://www.openwall.com/lists/oss-security/2023/06/07/1 - (MISC) https://www.openwall.com/lists/oss-security/2023/06/07/1 - Exploit, Mailing List
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

17 Jun 2023, 09:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2023/06/17/1 -

16 Jun 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-16 21:15

Updated : 2024-11-21 08:08


NVD link : CVE-2023-35788

Mitre link : CVE-2023-35788

CVE.ORG link : CVE-2023-35788


JSON object : View

Products Affected

netapp

  • h700s_firmware
  • h410c_firmware
  • h300s_firmware
  • h300s
  • h500s
  • h410s
  • h500s_firmware
  • h410c
  • h410s_firmware
  • h700s

canonical

  • ubuntu_linux

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write