Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3711-1 | linux-5.10 security update |
Debian DSA |
DSA-5594-1 | linux security update |
EUVD |
EUVD-2023-58376 | An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the kernel ring buffer (dmesg). |
Ubuntu USN |
USN-6639-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6680-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6680-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6680-3 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-6681-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6681-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6681-3 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6681-4 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-6686-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6686-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6686-3 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-6686-4 | Linux kernel (KVM) vulnerabilities |
Ubuntu USN |
USN-6686-5 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6701-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6701-2 | Linux kernel (GCP) vulnerabilities |
Ubuntu USN |
USN-6701-3 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6701-4 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-6705-1 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-6716-1 | Linux kernel (Azure) vulnerabilities |
Solution
No solution given by the vendor.
Workaround
This flaw can be mitigated by explicitly setting the kernel parameter to restrict unprivileged users from using dmesg: ``` sudo sysctl -w kernel.dmesg_restrict=1 ``` To make it persistent between system reboots: ``` echo 'kernel.dmesg_restrict=1' | sudo tee -a /etc/sysctl.conf ```
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 15 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-06T20:01:43.127Z
Reserved: 2023-11-14T10:18:51.337Z
Link: CVE-2023-6121
Updated: 2024-08-02T08:21:17.422Z
Status : Modified
Published: 2023-11-16T15:15:11.197
Modified: 2024-11-21T08:43:10.460
Link: CVE-2023-6121
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN