An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.
References
| Link | Resource |
|---|---|
| http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html | |
| http://www.openwall.com/lists/oss-security/2024/01/12/1 | Mailing List Patch Third Party Advisory |
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6040 | Third Party Advisory |
| https://www.openwall.com/lists/oss-security/2024/01/12/1 | Mailing List Third Party Advisory |
Configurations
History
08 Feb 2024, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
22 Jan 2024, 16:00
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| References | () http://www.openwall.com/lists/oss-security/2024/01/12/1 - Mailing List, Patch, Third Party Advisory | |
| References | () https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6040 - Third Party Advisory | |
| References | () https://www.openwall.com/lists/oss-security/2024/01/12/1 - Mailing List, Third Party Advisory |
12 Jan 2024, 13:47
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
12 Jan 2024, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
12 Jan 2024, 02:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-01-12 02:15
Updated : 2024-02-08 16:15
NVD link : CVE-2023-6040
Mitre link : CVE-2023-6040
CVE.ORG link : CVE-2023-6040
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read
