An out-of-bounds read vulnerability was found in the SR-IPv6 implementation in the Linux kernel. The flaw exists within the processing of seg6 attributes. The issue results from the improper validation of user-supplied data, which can result in a read past the end of an allocated buffer. This flaw allows a privileged local user to disclose sensitive information on affected installations of the Linux kernel.
| Version | Score | Severity | Vector String |
|---|---|---|---|
| 3.1 | 4.4 | Medium | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N |
| Product | Vendor | Version |
|---|---|---|
| Red Hat Enterprise Linux 7 | Red Hat | <= 5.4.* |
| Fedora | Fedora | <= 4.19.* |
| Red Hat Enterprise Linux 6 | Red Hat | < ba08cbc5b53e151d0acf1930fb526fc65b7f3e65 |
| Red Hat Enterprise Linux 8 | Red Hat | < be4df018c0be5ebecf1ca510feacc23be415cefc |
| Red Hat Enterprise Linux 7 | Red Hat | <= 5.2.0.12 |
| Red Hat Enterprise Linux 7 | Red Hat | <= * |
| Red Hat Enterprise Linux 8 | Red Hat | <= 5.10.* |
| kernel | n/a | 5.15 |