Description
A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to cause a 4 byte out-of-bounds read of XFRMA_MTIMER_THRESH when parsing netlink attributes, leading to potential leakage of sensitive heap data to userspace.
References (5)
Core 5
Core References
Third Party Advisory
https://www.debian.org/security/2023/dsa-5492
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2023:6583
Third Party Advisory vdb-entry
x_refsource_redhat
https://access.redhat.com/security/cve/CVE-2023-3773
Issue Tracking, Third Party Advisory issue-tracking
x_refsource_redhat
https://bugzilla.redhat.com/show_bug.cgi?id=2218944
Scores
CVSS v3
5.5
EPSS
0.0002
EPSS Percentile
3.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-125
Status
published
Products (6)
debian/debian_linux
10.0
debian/debian_linux
12.0
fedoraproject/fedora
linux/linux_kernel
redhat/enterprise_linux
8.0
redhat/enterprise_linux
9.0
Published
Jul 25, 2023
Tracked Since
Feb 18, 2026