We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Zendesk (Helpdesk and Chat)
Bugpilot (Bug tracking)

Ok

THREATINT CVE Home CVE Diag Help
PUBLISHED

CVE-2023-39194

Kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match()

Reserved:2023-07-25
Published:2023-10-09
Updated:2024-04-04

Description

A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.



LOW: 3.2CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N

Problem types

Out-of-bounds Read

Product status

6.5-rc7
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Timeline

2023-07-25:Reported to Red Hat.
2023-09-29:Made public.

References

https://access.redhat.com/security/cve/CVE-2023-39194 vdb-entry

https://bugzilla.redhat.com/show_bug.cgi?id=2226788 (RHBZ#2226788) issue-tracking

https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html

https://www.zerodayinitiative.com/advisories/ZDI-CAN-18111/

cve.org CVE-2023-39194

nvd.nist.gov CVE-2023-39194

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-39194