CVE-2023-35788
moderate-risk
Published 2023-06-16
An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.
Do I need to act?
-
0.01% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (14)
References (20)
Third Party Advisory
http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LS...
Third Party Advisory
https://security.netapp.com/advisory/ntap-20230714-0002/
Third Party Advisory
https://www.debian.org/security/2023/dsa-5448
Third Party Advisory
https://www.debian.org/security/2023/dsa-5480
Third Party Advisory
http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LS...
Third Party Advisory
https://security.netapp.com/advisory/ntap-20230714-0002/
Third Party Advisory
https://www.debian.org/security/2023/dsa-5448
Third Party Advisory
https://www.debian.org/security/2023/dsa-5480
42
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
0/34 · Minimal
Exposure
18/34 · Moderate