PT-2023-5616 · Linux+10 · Linux Kernel+10
Grigoritchy
·
Published
2023-08-28
·
Updated
2025-09-29
·
CVE-2023-39192
CVSS v3.1
6.7
Medium
| Vector | AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L |
Name of the Vulnerable Software and Affected Versions
Linux Kernel (affected versions not specified)
Description
The issue is related to a flaw in the Netfilter subsystem of the Linux kernel, specifically in the xt u32 module, which does not validate fields in the xt u32 structure. This allows a local privileged attacker to trigger an out-of-bounds read by setting size fields beyond array boundaries, potentially leading to a crash or information disclosure. The flaw is associated with the
u32 match it function and involves reading data beyond buffer boundaries in memory.Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
Out of bounds Read
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Alt Linux
Almalinux
Astra Linux
Centos
Linux Kernel
Linuxmint
Red Hat
Red Os
Rocky Linux
Suse
Ubuntu