First published: Wed Jul 26 2023(Updated: )
A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <6.6 | |
Redhat Enterprise Linux | =8.0 | |
Fedoraproject Fedora | =38 | |
Linux kernel | ||
redhat/kernel | <6.6 | 6.6 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.112-1 6.11.5-1 6.11.7-1 |
If not needed, disable the ability for unprivileged users to create namespaces. To do this temporarily, do: sudo sysctl -w kernel.unprivileged_userns_clone=0 To disable across reboots, do: echo kernel.unprivileged_userns_clone=0 | \ sudo tee /etc/sysctl.d/99-disable-unpriv-userns.conf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2023-39192.
The title of this vulnerability is Linux Kernel Netfilter Xtables Out-Of-Bounds Read Information Disclosure Vulnerability.
The severity of CVE-2023-39192 is medium.
An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.
The affected software includes Linux Kernel versions up to 6.6, Redhat Enterprise Linux version 8.0, and Fedoraproject Fedora version 38.