Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-39192

Опубликовано: 09 окт. 2023
Источник: debian
EPSS Низкий

Описание

A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.5.3-1package
linuxfixed6.1.55-1bookwormpackage
linuxfixed5.10.197-1bullseyepackage

Примечания

  • https://www.zerodayinitiative.com/advisories/ZDI-23-1490/

  • https://git.kernel.org/linus/69c5d284f67089b4750d28ff6ac6f52ec224b330 (6.6-rc1)

EPSS

Процентиль: 1%
0.00009
Низкий

Связанные уязвимости

CVSS3: 6.7
ubuntu
больше 1 года назад

A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.

CVSS3: 6.7
redhat
больше 1 года назад

A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.

CVSS3: 6.7
nvd
больше 1 года назад

A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.

CVSS3: 6.7
github
больше 1 года назад

A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.

CVSS3: 6
fstec
почти 2 года назад

Уязвимость функции u32_match_it подсистемы Netfilter ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 1%
0.00009
Низкий