A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to cause a 4 byte out-of-bounds read of XFRMA_MTIMER_THRESH when parsing netlink attributes, leading to potential leakage of sensitive heap data to userspace.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2023:6583 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2023-3773 | vdb entry third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2218944 | issue tracking third party advisory |
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html | |
https://www.debian.org/security/2023/dsa-5492 |