Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: xfrm: Zero padding when dumping algos and encap When copying data to user-space we should ensure that only valid data is copied over. Padding in structures may be filled with random (possibly sensitve) data and should never be given directly to user-space. This patch fixes the copying of xfrm algorithms and the encap template in xfrm_user so that padding is zeroed.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.11, < 5.15.106 |
References
- https://git.kernel.org/stable/c/0725daaa9a879388ed312110f62dbd5ea2d75f8fPatch
- https://git.kernel.org/stable/c/1a351e26cc010d6991fbbd5701ac16581372e26fPatch
- https://git.kernel.org/stable/c/5218af4ad5d8948faac19f71583bcd786c3852dfPatch
- https://git.kernel.org/stable/c/8222d5910dae08213b6d9d4bc9a7f8502855e624Patch
FAQ
What is CVE-2023-53684?
CVE-2023-53684 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: xfrm: Zero padding when dumping algos and encap When copying data to user-space we should ensure that only valid data is copied ov...
How severe is CVE-2023-53684?
CVE-2023-53684 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-53684?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.