CVE ID | CVE-2023-52628 |
CVSS SCORE | 7.3, AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L |
AFFECTED VENDORS |
Linux |
AFFECTED PRODUCTS |
Kernel |
VULNERABILITY DETAILS |
This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the nft_exthdr_tcp_eval function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. |
ADDITIONAL DETAILS |
Linux has issued an update to correct this vulnerability. More details can be found at:
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v6.1.67&id=d9ebfc0f21377690837ebbd119e679243e0099cc |
DISCLOSURE TIMELINE |
|
CREDIT | Alex Birnberg |