Lucene search

K
redhatcveRedhat.comRH:CVE-2023-6121
HistoryNov 16, 2023 - 12:13 p.m.

CVE-2023-6121

2023-11-1612:13:43
redhat.com
access.redhat.com
5
linux kernel
nvme
tcp subsystem
buffer overflow
remote attackers
kernel parameter
dmesg restriction

4.6 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

51.9%

An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the kernel ring buffer (dmesg).

Mitigation

This flaw can be mitigated by explicitly setting the kernel parameter to restrict unprivileged users from using dmesg:

sudo sysctl -w kernel.dmesg_restrict=1  

To make it persistent between system reboots:

echo 'kernel.dmesg_restrict=1' | sudo tee -a /etc/sysctl.conf  

4.6 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

51.9%