Description Preview
A heap out-of-bounds write vulnerability (CWE-787) exists in the Linux Kernel ipvlan network driver. The vulnerability is caused by missing skb->cb initialization in the ipvlan network driver. This flaw can be exploited by local attackers to achieve privilege escalation on systems where CONFIG_IPVLAN is enabled. The vulnerability allows writing outside the bounds of allocated memory, potentially leading to arbitrary code execution with elevated privileges.
Overview
This vulnerability (CVE-2023-3090) affects the Linux Kernel's ipvlan network driver. The ipvlan driver allows for the creation of multiple virtual network interfaces with different Layer 2 MAC addresses on top of a single physical interface. The vulnerability stems from improper initialization of the skb->cb (control buffer) in the driver code, leading to a heap out-of-bounds write condition. When exploited, this vulnerability allows a local attacker to write data beyond the boundaries of allocated memory, potentially leading to privilege escalation. The vulnerability is only present when the kernel is compiled with CONFIG_IPVLAN enabled.
Remediation
To address this vulnerability, system administrators should:
- Update the Linux kernel to a version that includes the fix (commit 90cbed5247439a966b645b34eb0a2e037836ea8e).
- Apply available security patches from your Linux distribution vendor.
- If immediate patching is not possible, consider disabling the ipvlan module if it's not required for system operation.
- For Debian users, apply the security updates referenced in DSA-5448 and DSA-5480.
- For systems using kernel live patching, apply the appropriate live patches as referenced in LSN-0097-1 and LSN-0098-1.
- NetApp customers should refer to security advisory ntap-20230731-0002 for specific remediation steps.
References
- Linux Kernel patch: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=90cbed5247439a966b645b34eb0a2e037836ea8e
- Kernel patch visualization: https://kernel.dance/90cbed5247439a966b645b34eb0a2e037836ea8e
- Debian security advisories:
- https://www.debian.org/security/2023/dsa-5448
- https://www.debian.org/security/2023/dsa-5480
- https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
- https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
- Kernel Live Patch Security Notices:
- http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
- http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
- NetApp security advisory: https://security.netapp.com/advisory/ntap-20230731-0002/
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- ManufacturingManufacturing
- Health Care & Social AssistanceHealth Care & Social Assistance
- Public AdministrationPublic Administration
- Finance and InsuranceFinance and Insurance
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Educational ServicesEducational Services
- Other Services (except Public Administration)Other Services (except Public Administration)
- Retail TradeRetail Trade
- Transportation & WarehousingTransportation & Warehousing
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- InformationInformation
- UtilitiesUtilities
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- Wholesale TradeWholesale Trade
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- ConstructionConstruction
- MiningMining