mirror of https://gitee.com/openkylin/genmai.git
add data/KernelPocs/CVE-2023-0179/CVE-2023-0179.yaml.
Signed-off-by: Cage <wangjiaming2022@buaa.edu.cn>
This commit is contained in:
parent
736cbe5297
commit
28ffc1d681
|
@ -0,0 +1,24 @@
|
|||
FormatVer: 20230309
|
||||
Id: CVE-2023-0179
|
||||
Belong: kernel
|
||||
PocHazardLevel: Medium
|
||||
Source: https://github.com/TurtleARM/CVE-2023-0179-PoC
|
||||
SiteInfo:
|
||||
Name: Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核
|
||||
Severity: high
|
||||
Description:
|
||||
Linux Kernel nftables 存在整数溢出漏洞,该漏洞是由于nft_payload_copy_vlan函数的ethlen变量计算不正确,经过身份验证的攻击者可以利用该漏洞将本地权限提升至ROOT权限。
|
||||
ScopeOfInfluence:
|
||||
v5.5-rc1 <= Linux Kernel <= v6.2-rc4
|
||||
References:
|
||||
- https://www.openwall.com/lists/oss-security/2023/01/13/2
|
||||
- https://patchwork.ozlabs.org/project/netfilter-devel/patch/20230111212251.193032-4-pablo@netfilter.org/
|
||||
SiteClassification:
|
||||
CvssMetrics: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
||||
CvssScore: 7.8
|
||||
CveId: CVE-2023-0179
|
||||
CweId: CWE-190
|
||||
CnvdId: None
|
||||
KveId: None
|
||||
Tags:
|
||||
- 权限提升
|
Loading…
Reference in New Issue