A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

Subscriptions

Vendors Products
Fedoraproject Subscribe
Linux Kernel Subscribe
Enterprise Linux Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3710-1 linux security update
EUVD EUVD EUVD-2023-42924 A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.
Ubuntu USN Ubuntu USN USN-6461-1 Linux kernel (OEM) vulnerabilities
Ubuntu USN Ubuntu USN USN-6494-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6494-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6532-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6534-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6534-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6534-3 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6536-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6537-1 Linux kernel (GCP) vulnerabilities
Ubuntu USN Ubuntu USN USN-6548-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6548-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6548-3 Linux kernel (Oracle) vulnerabilities
Ubuntu USN Ubuntu USN USN-6549-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6549-2 Linux kernel (GKE) vulnerabilities
Ubuntu USN Ubuntu USN USN-6549-3 Linux kernel (Low Latency) vulnerabilities
Ubuntu USN Ubuntu USN USN-6548-4 Linux kernel (GKE) vulnerabilities
Ubuntu USN Ubuntu USN USN-6548-5 Linux kernel (IoT) vulnerabilities
Ubuntu USN Ubuntu USN USN-6549-4 Linux kernel (Intel IoTG) vulnerabilities
Ubuntu USN Ubuntu USN USN-6549-5 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6573-1 Linux kernel (Azure) vulnerabilities
Ubuntu USN Ubuntu USN USN-6635-1 Linux kernel (GCP) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

This flaw can be mitigated by preventing the affected Passive OS Fingerprinting match module (`xt_osf`) from being loaded. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278.

History

Fri, 22 Nov 2024 12:00:00 +0000

Type Values Removed Values Added
References

Fri, 13 Sep 2024 19:45:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-06T19:47:40.196Z

Reserved: 2023-07-25T16:01:14.835Z

Link: CVE-2023-39189

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-10-09T18:15:10.160

Modified: 2024-11-21T08:14:52.793

Link: CVE-2023-39189

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-08-30T00:00:00Z

Links: CVE-2023-39189 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses