A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.

Subscriptions

Vendors Products
Fedoraproject Subscribe
Linux Kernel Subscribe
Enterprise Linux Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3710-1 linux security update
EUVD EUVD EUVD-2023-42927 A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.
Ubuntu USN Ubuntu USN USN-6494-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6494-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6532-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6534-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6534-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6534-3 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6548-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6548-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6548-3 Linux kernel (Oracle) vulnerabilities
Ubuntu USN Ubuntu USN USN-6549-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6549-2 Linux kernel (GKE) vulnerabilities
Ubuntu USN Ubuntu USN USN-6549-3 Linux kernel (Low Latency) vulnerabilities
Ubuntu USN Ubuntu USN USN-6548-4 Linux kernel (GKE) vulnerabilities
Ubuntu USN Ubuntu USN USN-6548-5 Linux kernel (IoT) vulnerabilities
Ubuntu USN Ubuntu USN USN-6549-4 Linux kernel (Intel IoTG) vulnerabilities
Ubuntu USN Ubuntu USN USN-6549-5 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6635-1 Linux kernel (GCP) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

This flaw can be mitigated by preventing the affected `xt_u32` kernel module from being loaded. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278.

History

Fri, 22 Nov 2024 12:00:00 +0000

Type Values Removed Values Added
References

Fri, 15 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-08T07:10:41.834Z

Reserved: 2023-07-25T16:01:14.836Z

Link: CVE-2023-39192

cve-icon Vulnrichment

Updated: 2024-08-02T18:02:06.518Z

cve-icon NVD

Status : Modified

Published: 2023-10-09T18:15:10.233

Modified: 2024-11-21T08:14:53.120

Link: CVE-2023-39192

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-09-29T00:00:00Z

Links: CVE-2023-39192 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses