CVE-2023-39193Out-of-bounds Read in Kernel

CWE-125Out-of-bounds Read23 documents9 sources
Severity
6.0MEDIUMNVD
CNA6.1
EPSS
0.0%
top 99.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 9
Latest updateFeb 14

Description

A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:HExploitability: 0.8 | Impact: 5.2

Affected Packages2 packages

Debianlinux/linux_kernel< 5.10.197-1+3

Also affects: Enterprise Linux 8.0, 9.0, Fedora 38

Patches

🔴Vulnerability Details

3
OSV
CVE-2023-39193: A flaw was found in the Netfilter subsystem in the Linux kernel2023-10-09
GHSA
GHSA-mpcv-wcv8-6rxw: A flaw was found in the Netfilter subsystem in the Linux kernel2023-10-09
CVEList
Kernel: netfilter: xtables sctp out-of-bounds read in match_flags()2023-10-09

📋Vendor Advisories

18
Ubuntu
Linux kernel (GCP) vulnerabilities2024-02-14
Ubuntu
Linux kernel vulnerabilities2024-01-10
Ubuntu
Linux kernel (IoT) vulnerabilities2024-01-10
Ubuntu
Linux kernel (GKE) vulnerabilities2024-01-09
Ubuntu
Linux kernel (Intel IoTG) vulnerabilities2024-01-05

💬Community

1
Bugzilla
CVE-2023-39193 kernel: netfilter: xtables sctp out-of-bounds read in match_flags()2023-07-26
CVE-2023-39193 — Out-of-bounds Read in Linux Kernel | cvebase