Description
An out-of-bounds read vulnerability was found in the SR-IPv6 implementation in the Linux kernel. The flaw exists within the processing of seg6 attributes. The issue results from the improper validation of user-supplied data, which can result in a read past the end of an allocated buffer. This flaw allows a privileged local user to disclose sensitive information on affected installations of the Linux kernel.
References (3)
Core 3
Core References
Third Party Advisory, VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-CAN-18511
Third Party Advisory vdb-entry
x_refsource_redhat
https://access.redhat.com/security/cve/CVE-2023-2860
Issue Tracking, Patch issue-tracking
x_refsource_redhat
https://bugzilla.redhat.com/show_bug.cgi?id=2218122
Scores
CVSS v3
4.4
EPSS
0.0001
EPSS Percentile
2.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-125
Status
published
Products (2)
linux/linux_kernel
6.0 rc1 (4 CPE variants)
linux/linux_kernel
< 5.19.19
Published
Jul 24, 2023
Tracked Since
Feb 18, 2026