CVE-2023-35788

An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.
References
Link Resource
http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2023/06/17/1 Exploit Mailing List
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.7 Mailing List Patch
https://git.kernel.org/linus/4d56304e5827c8cc8cc18c75343d283af7c4825c Patch
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20230714-0002/ Third Party Advisory
https://www.debian.org/security/2023/dsa-5448 Third Party Advisory
https://www.debian.org/security/2023/dsa-5480 Third Party Advisory
https://www.openwall.com/lists/oss-security/2023/06/07/1 Exploit Mailing List
http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2023/06/17/1 Exploit Mailing List
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.7 Mailing List Patch
https://git.kernel.org/linus/4d56304e5827c8cc8cc18c75343d283af7c4825c Patch
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20230714-0002/ Third Party Advisory
https://www.debian.org/security/2023/dsa-5448 Third Party Advisory
https://www.debian.org/security/2023/dsa-5480 Third Party Advisory
https://www.openwall.com/lists/oss-security/2023/06/07/1 Exploit Mailing List
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*

Configuration 8 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*

Configuration 9 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

21 Nov 2024, 08:08

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html - Third Party Advisory, VDB Entry
References () http://www.openwall.com/lists/oss-security/2023/06/17/1 - Exploit, Mailing List () http://www.openwall.com/lists/oss-security/2023/06/17/1 - Exploit, Mailing List
References () https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.7 - Mailing List, Patch () https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.7 - Mailing List, Patch
References () https://git.kernel.org/linus/4d56304e5827c8cc8cc18c75343d283af7c4825c - Patch () https://git.kernel.org/linus/4d56304e5827c8cc8cc18c75343d283af7c4825c - Patch
References () https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html - Mailing List, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20230714-0002/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20230714-0002/ - Third Party Advisory
References () https://www.debian.org/security/2023/dsa-5448 - Third Party Advisory () https://www.debian.org/security/2023/dsa-5448 - Third Party Advisory
References () https://www.debian.org/security/2023/dsa-5480 - Third Party Advisory () https://www.debian.org/security/2023/dsa-5480 - Third Party Advisory
References () https://www.openwall.com/lists/oss-security/2023/06/07/1 - Exploit, Mailing List () https://www.openwall.com/lists/oss-security/2023/06/07/1 - Exploit, Mailing List

02 Nov 2023, 01:36

Type Values Removed Values Added
First Time Canonical
Canonical ubuntu Linux
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
References (MISC) http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html - (MISC) http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html - Third Party Advisory, VDB Entry
References (MLIST) https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html - (MLIST) https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html - Mailing List, Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2023/dsa-5480 - (DEBIAN) https://www.debian.org/security/2023/dsa-5480 - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html - (MLIST) https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html - Mailing List, Third Party Advisory

20 Oct 2023, 00:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html -

11 Sep 2023, 19:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html -

19 Aug 2023, 18:16

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2023/dsa-5480 -

27 Jul 2023, 21:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html -

21 Jul 2023, 19:20

Type Values Removed Values Added
First Time Netapp h410s
Netapp h700s
Netapp h410s Firmware
Netapp h500s
Netapp h410c
Netapp h410c Firmware
Netapp
Netapp h500s Firmware
Debian debian Linux
Netapp h700s Firmware
Netapp h300s Firmware
Netapp h300s
Debian
References (CONFIRM) https://security.netapp.com/advisory/ntap-20230714-0002/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20230714-0002/ - Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2023/dsa-5448 - (DEBIAN) https://www.debian.org/security/2023/dsa-5448 - Third Party Advisory
CPE cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*

18 Jul 2023, 08:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20230714-0002/ -

06 Jul 2023, 04:15

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2023/dsa-5448 -

23 Jun 2023, 21:19

Type Values Removed Values Added
References (MISC) https://www.openwall.com/lists/oss-security/2023/06/07/1 - (MISC) https://www.openwall.com/lists/oss-security/2023/06/07/1 - Exploit, Mailing List
References (MLIST) http://www.openwall.com/lists/oss-security/2023/06/17/1 - (MLIST) http://www.openwall.com/lists/oss-security/2023/06/17/1 - Exploit, Mailing List
References (MISC) https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.7 - (MISC) https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.7 - Mailing List, Patch
References (MISC) https://git.kernel.org/linus/4d56304e5827c8cc8cc18c75343d283af7c4825c - (MISC) https://git.kernel.org/linus/4d56304e5827c8cc8cc18c75343d283af7c4825c - Patch
CWE CWE-787
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux linux Kernel
Linux

17 Jun 2023, 09:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2023/06/17/1 -

16 Jun 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-16 21:15

Updated : 2024-11-21 08:08


NVD link : CVE-2023-35788

Mitre link : CVE-2023-35788

CVE.ORG link : CVE-2023-35788


JSON object : View

Products Affected

debian

  • debian_linux

netapp

  • h700s_firmware
  • h300s
  • h300s_firmware
  • h500s_firmware
  • h410c
  • h410s_firmware
  • h410c_firmware
  • h500s
  • h410s
  • h700s

canonical

  • ubuntu_linux

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write