Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-39189

Опубликовано: 09 окт. 2023
Источник: debian
EPSS Низкий

Описание

A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.5.6-1package
linuxfixed6.1.55-1bookwormpackage
linuxfixed5.10.197-1bullseyepackage

Примечания

  • https://git.kernel.org/linus/f4f8a7803119005e87b716874bec07c751efafec (6.6-rc1)

EPSS

Процентиль: 1%
0.00009
Низкий

Связанные уязвимости

CVSS3: 5.1
ubuntu
около 2 лет назад

A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

CVSS3: 5.1
redhat
около 2 лет назад

A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

CVSS3: 5.1
nvd
около 2 лет назад

A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

CVSS3: 6
msrc
около 2 лет назад

Kernel: netfilter: nftables out-of-bounds read in nf_osf_match_one()

CVSS3: 5.1
github
около 2 лет назад

A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

EPSS

Процентиль: 1%
0.00009
Низкий
Уязвимость CVE-2023-39189