First published: Fri Jan 12 2024(Updated: )
An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.
Credit: security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <5.18 | 5.18 |
Linux Kernel | >=4.16<4.19.305 | |
Linux Kernel | >=4.20<5.4.267 | |
Linux Kernel | >=5.5<5.10.208 | |
Linux Kernel | >=5.11<5.15.147 | |
Linux Kernel | >=5.16<5.18 | |
Debian Linux | =10.0 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.21-1 6.12.22-1 |
If not needed, disable the ability for unprivileged users to create namespaces. To do this temporarily, do: sudo sysctl -w kernel.unprivileged_userns_clone=0 To disable across reboots, do: echo kernel.unprivileged_userns_clone=0 | \ sudo tee /etc/sysctl.d/99-disable-unpriv-userns.conf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6040 is classified as a high-severity vulnerability due to the potential for out-of-bounds access leading to denial of service or other impacts.
To fix CVE-2023-6040, update the kernel to version 5.18 or later, or apply the appropriate patches provided by your distribution.
CVE-2023-6040 affects Linux Kernel versions between 4.16 and 5.18, including specific versions of Debian and Red Hat kernels.
While CVE-2023-6040 primarily poses a risk of denial of service, it could potentially lead to data corruption in certain exploitation scenarios.
There are no recommended workarounds for CVE-2023-6040 other than upgrading to the fixed versions of the kernel.