{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T12:48:22.142","vulnerabilities":[{"cve":{"id":"CVE-2023-49062","sourceIdentifier":"cve-assign@fb.com","published":"2023-11-28T16:15:07.023","lastModified":"2024-11-21T08:32:45.310","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Katran could disclose non-initialized kernel memory as part of an IP header. The issue was present for IPv4 encapsulation and ICMP (v4) Too Big packet generation. After a bpf_xdp_adjust_head call, Katran code didn’t initialize the Identification field for the IPv4 header, resulting in writing content of kernel memory in that field of IP header. The issue affected all Katran versions prior to commit 6a03106ac1eab39d0303662963589ecb2374c97f"},{"lang":"es","value":"Katran podría revelar memoria del kernel no inicializada como parte de un encabezado IP. El problema estaba presente en la encapsulación IPv4 y en la generación de paquetes ICMP (v4) Too Big. Después de una llamada a bpf_xdp_adjust_head, el código Katran no inicializó el campo de identificación para el encabezado IPv4, lo que resultó en la escritura del contenido de la memoria del kernel en ese campo del encabezado IP. El problema afectó a todas las versiones de Katran antes del commit 6a03106ac1eab39d0303662963589ecb2374c97f"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-665"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:facebook:katran:*:*:*:*:*:*:*:*","versionEndExcluding":"2023-11-15","matchCriteriaId":"C62809AA-C0F4-4F93-B42B-431F9A0A1762"}]}]}],"references":[{"url":"https://github.com/facebookincubator/katran/commit/6a03106ac1eab39d0303662963589ecb2374c97f","source":"cve-assign@fb.com","tags":["Patch"]},{"url":"https://www.facebook.com/security/advisories/cve-2023-49062","source":"cve-assign@fb.com","tags":["Vendor Advisory"]},{"url":"https://github.com/facebookincubator/katran/commit/6a03106ac1eab39d0303662963589ecb2374c97f","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://www.facebook.com/security/advisories/cve-2023-49062","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}