A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

Subscriptions

Vendors Products
Fedoraproject Subscribe
Linux Kernel Subscribe
Enterprise Linux Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3710-1 linux security update
EUVD EUVD EUVD-2023-42928 A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.
Ubuntu USN Ubuntu USN USN-6494-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6494-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6532-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6534-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6534-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6534-3 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6548-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6548-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6548-3 Linux kernel (Oracle) vulnerabilities
Ubuntu USN Ubuntu USN USN-6549-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6549-2 Linux kernel (GKE) vulnerabilities
Ubuntu USN Ubuntu USN USN-6549-3 Linux kernel (Low Latency) vulnerabilities
Ubuntu USN Ubuntu USN USN-6548-4 Linux kernel (GKE) vulnerabilities
Ubuntu USN Ubuntu USN USN-6548-5 Linux kernel (IoT) vulnerabilities
Ubuntu USN Ubuntu USN USN-6549-4 Linux kernel (Intel IoTG) vulnerabilities
Ubuntu USN Ubuntu USN USN-6549-5 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6635-1 Linux kernel (GCP) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

This flaw can be mitigated by preventing the affected `xt_sctp` kernel module from being loaded. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278.

History

Fri, 22 Nov 2024 12:00:00 +0000

Type Values Removed Values Added
References

Fri, 15 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-06T19:47:45.744Z

Reserved: 2023-07-25T16:01:14.836Z

Link: CVE-2023-39193

cve-icon Vulnrichment

Updated: 2024-08-02T18:02:06.556Z

cve-icon NVD

Status : Modified

Published: 2023-10-09T18:15:10.303

Modified: 2024-11-21T08:14:53.260

Link: CVE-2023-39193

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-09-29T00:00:00Z

Links: CVE-2023-39193 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses