An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the kernel ring buffer (dmesg).
Fixes

Solution

No solution given by the vendor.


Workaround

This flaw can be mitigated by explicitly setting the kernel parameter to restrict unprivileged users from using dmesg: ``` sudo sysctl -w kernel.dmesg_restrict=1 ``` To make it persistent between system reboots: ``` echo 'kernel.dmesg_restrict=1' | sudo tee -a /etc/sysctl.conf ```

History

Fri, 22 Nov 2024 12:00:00 +0000

Type Values Removed Values Added
References

Fri, 15 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-07-23T21:51:55.280Z

Reserved: 2023-11-14T10:18:51.337Z

Link: CVE-2023-6121

cve-icon Vulnrichment

Updated: 2024-08-02T08:21:17.422Z

cve-icon NVD

Status : Modified

Published: 2023-11-16T15:15:11.197

Modified: 2024-11-21T08:43:10.460

Link: CVE-2023-6121

cve-icon Redhat

Severity : Low

Publid Date: 2023-11-06T00:00:00Z

Links: CVE-2023-6121 - Bugzilla

cve-icon OpenCVE Enrichment

No data.