First published: Wed Jun 28 2023(Updated: )
An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel | ||
Linux Kernel | >=2.6.26<5.4.251 | |
Linux Kernel | >=5.5<5.10.188 | |
Linux Kernel | >=5.11<5.15.121 | |
Linux Kernel | >=5.16<6.1.39 | |
Linux Kernel | >=6.2<6.3.13 | |
Linux Kernel | >=6.4<6.4.4 | |
Red Hat Fedora | =38 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.19-1 6.12.20-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39197 has been classified as a moderate severity vulnerability due to its potential for information disclosure.
To mitigate CVE-2023-39197, update your Linux kernel to a version that includes the patch addressing this vulnerability.
CVE-2023-39197 affects various versions of the Linux kernel, including those between 2.6.26 and 6.4.
CVE-2023-39197 can be exploited by a remote user to perform an out-of-bounds read that may expose sensitive information.
CVE-2023-39197 impacts multiple Linux distributions, including Debian and Fedora, due to the shared vulnerability in the kernel.