Trinadh465 / linux-4.1.15_CVE-2023-28772

Other
0 stars 1 forks source link

CVE-2023-34319 (High) detected in linuxlinux-4.6 - autoclosed #842

Closed mend-bolt-for-github[bot] closed 6 months ago

mend-bolt-for-github[bot] commented 11 months ago

CVE-2023-34319 - High Severity Vulnerability

Vulnerable Library - linuxlinux-4.6

The Linux Kernel

Library home page: https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux

Found in base branch: master

Vulnerable Source Files (1)

/drivers/net/xen-netback/netback.c

Vulnerability Details

The fix for XSA-423 added logic to Linux'es netback driver to deal with a frontend splitting a packet in a way such that not all of the headers would come in one piece. Unfortunately the logic introduced there didn't account for the extreme case of the entire packet being split into as many pieces as permitted by the protocol, yet still being smaller than the area that's specially dealt with to keep all (possible) headers together. Such an unusual packet would therefore trigger a buffer overrun in the driver.

Publish Date: 2023-09-22

URL: CVE-2023-34319

CVSS 3 Score Details (7.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.linuxkernelcves.com/cves/CVE-2023-34319

Release Date: 2023-09-22

Fix Resolution: v4.14.321,v4.19.290,v5.4.252,v5.10.189,v5.15.125,v6.1.44,v6.4.9,v6.5-rc6


Step up your Open Source Security Game with Mend here