| CVE ID | CVE-2023-52628 |
| CVSS SCORE | 7.3, AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L |
| AFFECTED VENDORS |
Linux |
| AFFECTED PRODUCTS |
Kernel |
| VULNERABILITY DETAILS |
This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the nft_exthdr_ipv6_eval function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. |
| ADDITIONAL DETAILS |
Linux has issued an update to correct this vulnerability. More details can be found at:
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v6.1.67&id=d9ebfc0f21377690837ebbd119e679243e0099cc |
| DISCLOSURE TIMELINE |
|
| CREDIT | Alex Birnberg |