vulnerability
Red Hat: CVE-2023-39193: kernel: netfilter: xtables sctp out-of-bounds read in match_flags() (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:S/C:C/I:N/A:P) | 10/09/2023 | 05/23/2024 | 03/17/2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:S/C:C/I:N/A:P)
Published
10/09/2023
Added
05/23/2024
Modified
03/17/2025
Description
A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.
Solution(s)
redhat-upgrade-kernelredhat-upgrade-kernel-rt

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.