CVE ID | CVE-2023-39193 |
CVSS SCORE | 5.1, AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L |
AFFECTED VENDORS |
Linux |
AFFECTED PRODUCTS |
Kernel |
VULNERABILITY DETAILS |
This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the match_flags function. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. |
ADDITIONAL DETAILS |
Linux has issued an update to correct this vulnerability. More details can be found at:
https://lore.kernel.org/all/20230828221255.124812-1-wander@redhat.com/ |
DISCLOSURE TIMELINE |
|
CREDIT | Lucas Leong (@_wmliang_) of Trend Micro Zero Day Initiative |