CVE ID | CVE-2023-39192 |
CVSS SCORE | 6.7, AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L |
AFFECTED VENDORS |
Linux |
AFFECTED PRODUCTS |
Kernel |
VULNERABILITY DETAILS |
This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the u32_match_it function. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. |
ADDITIONAL DETAILS |
Linux has issued an update to correct this vulnerability. More details can be found at:
https://lore.kernel.org/all/20230828132107.18376-1-wander@redhat.com/ |
DISCLOSURE TIMELINE |
|
CREDIT | grigoritchy |