CVE-2023-42755: Out-of-bounds Read in Red Hat Red Hat Enterprise Linux 8
A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.
AI Analysis
Technical Summary
CVE-2023-42755 is a vulnerability identified in the IPv4 Resource Reservation Protocol (RSVP) classifier component of the Linux kernel, specifically affecting Red Hat Enterprise Linux 8. The issue arises due to improper bounds checking in the rsvp_classify function, where the xprt pointer can be advanced beyond the linear portion of the socket buffer (skb). This out-of-bounds read can lead to a kernel crash, causing a denial of service condition. The vulnerability requires local access with low privileges (AV:L/PR:L) and does not require user interaction (UI:N). The scope is classified as changed (S:C), indicating that the vulnerability affects resources beyond the local process, potentially impacting system stability. The CVSS v3.1 base score is 6.5, reflecting a medium severity level primarily due to the denial of service impact (A:H) without confidentiality or integrity compromise. No known exploits have been reported in the wild, but the flaw could be leveraged by an attacker with local access to disrupt system availability. The vulnerability is specific to the RSVP classifier, a networking component that manages resource reservations in IPv4 traffic, which may be used in specialized network environments. Red Hat Enterprise Linux 8 users should apply patches once available and monitor kernel updates to mitigate this risk.
Potential Impact
For European organizations, this vulnerability poses a risk of local denial of service attacks that can disrupt critical services running on Red Hat Enterprise Linux 8 systems. While the attack requires local access, it could be exploited by malicious insiders or attackers who have gained limited access through other means. The denial of service could impact availability of servers, network appliances, or infrastructure components relying on RSVP for traffic management. This is particularly relevant for sectors such as telecommunications, finance, government, and critical infrastructure where uptime and network reliability are essential. The absence of confidentiality or integrity impact limits the risk to data breaches, but system crashes could lead to operational disruptions and potential cascading effects in complex environments. Organizations with strict uptime requirements or those using RSVP in their network stacks should consider this vulnerability a priority for mitigation.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Apply the official Red Hat security patches for CVE-2023-42755 as soon as they are released to address the out-of-bounds read issue. 2) Restrict local user access to systems running Red Hat Enterprise Linux 8, enforcing the principle of least privilege to reduce the risk of exploitation by low-privileged users. 3) Monitor system logs and kernel crash reports for signs of exploitation attempts or unusual behavior related to the RSVP classifier. 4) If RSVP is not required in the network environment, consider disabling or removing the RSVP kernel module to eliminate the attack surface. 5) Employ host-based intrusion detection systems (HIDS) to detect anomalous local activity that could precede exploitation. 6) Maintain up-to-date backups and recovery plans to minimize downtime in case of denial of service incidents. 7) Conduct regular security audits and vulnerability assessments focusing on kernel-level vulnerabilities and local privilege escalation vectors.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2023-42755: Out-of-bounds Read in Red Hat Red Hat Enterprise Linux 8
Description
A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.
AI-Powered Analysis
Technical Analysis
CVE-2023-42755 is a vulnerability identified in the IPv4 Resource Reservation Protocol (RSVP) classifier component of the Linux kernel, specifically affecting Red Hat Enterprise Linux 8. The issue arises due to improper bounds checking in the rsvp_classify function, where the xprt pointer can be advanced beyond the linear portion of the socket buffer (skb). This out-of-bounds read can lead to a kernel crash, causing a denial of service condition. The vulnerability requires local access with low privileges (AV:L/PR:L) and does not require user interaction (UI:N). The scope is classified as changed (S:C), indicating that the vulnerability affects resources beyond the local process, potentially impacting system stability. The CVSS v3.1 base score is 6.5, reflecting a medium severity level primarily due to the denial of service impact (A:H) without confidentiality or integrity compromise. No known exploits have been reported in the wild, but the flaw could be leveraged by an attacker with local access to disrupt system availability. The vulnerability is specific to the RSVP classifier, a networking component that manages resource reservations in IPv4 traffic, which may be used in specialized network environments. Red Hat Enterprise Linux 8 users should apply patches once available and monitor kernel updates to mitigate this risk.
Potential Impact
For European organizations, this vulnerability poses a risk of local denial of service attacks that can disrupt critical services running on Red Hat Enterprise Linux 8 systems. While the attack requires local access, it could be exploited by malicious insiders or attackers who have gained limited access through other means. The denial of service could impact availability of servers, network appliances, or infrastructure components relying on RSVP for traffic management. This is particularly relevant for sectors such as telecommunications, finance, government, and critical infrastructure where uptime and network reliability are essential. The absence of confidentiality or integrity impact limits the risk to data breaches, but system crashes could lead to operational disruptions and potential cascading effects in complex environments. Organizations with strict uptime requirements or those using RSVP in their network stacks should consider this vulnerability a priority for mitigation.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Apply the official Red Hat security patches for CVE-2023-42755 as soon as they are released to address the out-of-bounds read issue. 2) Restrict local user access to systems running Red Hat Enterprise Linux 8, enforcing the principle of least privilege to reduce the risk of exploitation by low-privileged users. 3) Monitor system logs and kernel crash reports for signs of exploitation attempts or unusual behavior related to the RSVP classifier. 4) If RSVP is not required in the network environment, consider disabling or removing the RSVP kernel module to eliminate the attack surface. 5) Employ host-based intrusion detection systems (HIDS) to detect anomalous local activity that could precede exploitation. 6) Maintain up-to-date backups and recovery plans to minimize downtime in case of denial of service incidents. 7) Conduct regular security audits and vulnerability assessments focusing on kernel-level vulnerabilities and local privilege escalation vectors.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2023-09-13T11:03:47.962Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690eefde44af18c3752cf59a
Added to database: 11/8/2025, 7:23:10 AM
Last enriched: 11/8/2025, 7:34:39 AM
Last updated: 12/2/2025, 11:54:09 AM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13090: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in listingthemes WP Directory Kit
MediumCVE-2025-13353: CWE-330 Use of Insufficiently Random Values in Cloudflare gokey
HighPersonal Information of 33.7 Million Stolen From Coupang
MediumCVE-2025-13873: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in ObjectPlanet Opinio
MediumCVE-2025-13872: CWE-918 Server-Side Request Forgery (SSRF) in ObjectPlanet Opinio
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.