First published: Wed Jul 26 2023(Updated: )
A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <6.5 | |
Linux Linux kernel | =6.5-rc1 | |
Linux Linux kernel | =6.5-rc2 | |
Linux Linux kernel | =6.5-rc3 | |
Linux Linux kernel | =6.5-rc4 | |
Linux Linux kernel | =6.5-rc5 | |
Linux Linux kernel | =6.5-rc6 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
Fedoraproject Fedora | =38 | |
Linux kernel | ||
IBM Security Guardium | <=12.0 | |
redhat/kernel | <6.5 | 6.5 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.112-1 6.11.5-1 6.11.7-1 |
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE ID of this vulnerability is CVE-2023-39194.
The severity of CVE-2023-39194 is low.
This vulnerability can be exploited by local attackers who have the ability to execute high-privileged code on the target system.
The affected software includes the Linux Kernel versions up to exclusive 6.5.
Yes, a fix is available. Please refer to the vendor's advisory for the remediation steps.