A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3710-1 linux security update
EUVD EUVD EUVD-2023-42929 A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.
Ubuntu USN Ubuntu USN USN-6494-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6494-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6532-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6534-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6534-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6534-3 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6548-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6548-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6548-3 Linux kernel (Oracle) vulnerabilities
Ubuntu USN Ubuntu USN USN-6549-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6549-2 Linux kernel (GKE) vulnerabilities
Ubuntu USN Ubuntu USN USN-6549-3 Linux kernel (Low Latency) vulnerabilities
Ubuntu USN Ubuntu USN USN-6548-4 Linux kernel (GKE) vulnerabilities
Ubuntu USN Ubuntu USN USN-6548-5 Linux kernel (IoT) vulnerabilities
Ubuntu USN Ubuntu USN USN-6549-4 Linux kernel (Intel IoTG) vulnerabilities
Ubuntu USN Ubuntu USN USN-6549-5 Linux kernel vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

History

Fri, 22 Nov 2024 12:00:00 +0000

Type Values Removed Values Added
References

Fri, 13 Sep 2024 19:45:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-09-25T14:26:56.789Z

Reserved: 2023-07-25T16:01:14.836Z

Link: CVE-2023-39194

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-10-09T18:15:10.367

Modified: 2024-11-21T08:14:53.410

Link: CVE-2023-39194

cve-icon Redhat

Severity : Low

Publid Date: 2023-09-29T00:00:00Z

Links: CVE-2023-39194 - Bugzilla

cve-icon OpenCVE Enrichment

No data.