Lucene search

K
redhatcveRedhat.comRH:CVE-2023-6121
HistoryNov 16, 2023 - 12:13 p.m.

CVE-2023-6121

2023-11-1612:13:43
redhat.com
access.redhat.com
6
linux kernel
nvme
tcp subsystem
buffer overflow
remote attackers
kernel parameter
dmesg restriction

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4.6 Medium

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

67.8%

An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the kernel ring buffer (dmesg).

Mitigation

This flaw can be mitigated by explicitly setting the kernel parameter to restrict unprivileged users from using dmesg:

sudo sysctl -w kernel.dmesg_restrict=1  

To make it persistent between system reboots:

echo 'kernel.dmesg_restrict=1' | sudo tee -a /etc/sysctl.conf  

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4.6 Medium

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

67.8%