A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.
CVE-2023-39194 - Medium Severity Vulnerability
Vulnerable Library - linux-stable-rtv4.1.33
Julia Cartwright's fork of linux-stable-rt.git
Library home page: https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git
Found in HEAD commit: f1f3d2b150be669390b32dfea28e773471bdd6e7
Found in base branch: master
Vulnerable Source Files (2)
/net/xfrm/xfrm_user.c /net/xfrm/xfrm_user.c
Vulnerability Details
A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.
Publish Date: 2023-10-09
URL: CVE-2023-39194
CVSS 3 Score Details (4.4)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://www.linuxkernelcves.com/cves/CVE-2023-39194
Release Date: 2023-10-09
Fix Resolution: v4.14.324,v4.19.293,v5.4.255,v5.10.192,v5.15.128,v6.1.47,v6.4.12,v6.5-rc7
Step up your Open Source Security Game with Mend here