Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-42755: Out-of-bounds Read in Red Hat Red Hat Enterprise Linux 8

0
Medium
VulnerabilityCVE-2023-42755cvecve-2023-42755
Published: Thu Oct 05 2023 (10/05/2023, 18:25:23 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 8

Description

A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.

AI-Powered Analysis

AILast updated: 11/08/2025, 07:34:39 UTC

Technical Analysis

CVE-2023-42755 is a vulnerability identified in the IPv4 Resource Reservation Protocol (RSVP) classifier component of the Linux kernel, specifically affecting Red Hat Enterprise Linux 8. The issue arises due to improper bounds checking in the rsvp_classify function, where the xprt pointer can be advanced beyond the linear portion of the socket buffer (skb). This out-of-bounds read can lead to a kernel crash, causing a denial of service condition. The vulnerability requires local access with low privileges (AV:L/PR:L) and does not require user interaction (UI:N). The scope is classified as changed (S:C), indicating that the vulnerability affects resources beyond the local process, potentially impacting system stability. The CVSS v3.1 base score is 6.5, reflecting a medium severity level primarily due to the denial of service impact (A:H) without confidentiality or integrity compromise. No known exploits have been reported in the wild, but the flaw could be leveraged by an attacker with local access to disrupt system availability. The vulnerability is specific to the RSVP classifier, a networking component that manages resource reservations in IPv4 traffic, which may be used in specialized network environments. Red Hat Enterprise Linux 8 users should apply patches once available and monitor kernel updates to mitigate this risk.

Potential Impact

For European organizations, this vulnerability poses a risk of local denial of service attacks that can disrupt critical services running on Red Hat Enterprise Linux 8 systems. While the attack requires local access, it could be exploited by malicious insiders or attackers who have gained limited access through other means. The denial of service could impact availability of servers, network appliances, or infrastructure components relying on RSVP for traffic management. This is particularly relevant for sectors such as telecommunications, finance, government, and critical infrastructure where uptime and network reliability are essential. The absence of confidentiality or integrity impact limits the risk to data breaches, but system crashes could lead to operational disruptions and potential cascading effects in complex environments. Organizations with strict uptime requirements or those using RSVP in their network stacks should consider this vulnerability a priority for mitigation.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Apply the official Red Hat security patches for CVE-2023-42755 as soon as they are released to address the out-of-bounds read issue. 2) Restrict local user access to systems running Red Hat Enterprise Linux 8, enforcing the principle of least privilege to reduce the risk of exploitation by low-privileged users. 3) Monitor system logs and kernel crash reports for signs of exploitation attempts or unusual behavior related to the RSVP classifier. 4) If RSVP is not required in the network environment, consider disabling or removing the RSVP kernel module to eliminate the attack surface. 5) Employ host-based intrusion detection systems (HIDS) to detect anomalous local activity that could precede exploitation. 6) Maintain up-to-date backups and recovery plans to minimize downtime in case of denial of service incidents. 7) Conduct regular security audits and vulnerability assessments focusing on kernel-level vulnerabilities and local privilege escalation vectors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2023-09-13T11:03:47.962Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690eefde44af18c3752cf59a

Added to database: 11/8/2025, 7:23:10 AM

Last enriched: 11/8/2025, 7:34:39 AM

Last updated: 12/2/2025, 11:54:09 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats