A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to cause a 4 byte out-of-bounds read of XFRMA_MTIMER_THRESH when parsing netlink attributes, leading to potential leakage of sensitive heap data to userspace.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2023:6583 | |
https://access.redhat.com/security/cve/CVE-2023-3773 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2218944 | Issue Tracking Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2023/dsa-5492 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2023-07-25T15:47:40.391Z
Updated: 2024-05-01T20:20:49.531Z
Reserved: 2023-07-19T13:55:13.694Z
Link: CVE-2023-3773
JSON object: View
NVD Information
Status : Modified
Published: 2023-07-25T16:15:11.733
Modified: 2023-11-07T14:15:22.273
Link: CVE-2023-3773
JSON object: View
Redhat Information
No data.
CWE