CVE-2023-42753

CVSS V2 None CVSS V3 None
Description
An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.
Overview
  • CVE ID
  • CVE-2023-42753
  • Assigner
  • redhat
  • Vulnerability Status
  • PUBLISHED
  • Published Version
  • 2023-09-25T20:25:59.706Z
  • Last Modified Date
  • 2024-05-23T21:19:24.462Z
References
Reference URL Reference Tags
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
https://access.redhat.com/errata/RHSA-2023:7370 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2023:7379 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2023:7382 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2023:7389 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2023:7411 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2023:7418 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2023:7539 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2023:7558 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0089 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0113 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0134 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0340 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0346 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0347 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0371 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0376 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0378 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0402 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0403 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0412 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0461 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0562 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0563 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0593 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0999 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/security/cve/CVE-2023-42753 vdb-entry x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2239843 issue-tracking x_refsource_REDHAT
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://seclists.org/oss-sec/2023/q3/216
https://www.openwall.com/lists/oss-security/2023/09/22/10
History
Created Old Value New Value Data Type Notes
2024-06-25 13:35:46 Added to TrackCVE