{"vulnerability": "cve-2023-3919", "sightings": [{"uuid": "398c8c6e-9c35-45c0-afac-ffd2ea5824ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39191", "type": "seen", "source": "https://t.me/cibsecurity/71619", "content": "\u203c CVE-2023-39191 \u203c\n\nAn improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-04T22:12:08.000000Z"}, {"uuid": "40c8d427-ca28-4416-9022-0667b3938fdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39192", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-09", "content": "", "creation_timestamp": "2025-02-13T11:00:00.000000Z"}, {"uuid": "3c7db1d1-0067-424c-a1dc-5c02b3dc56ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39193", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-09", "content": "", "creation_timestamp": "2025-02-13T11:00:00.000000Z"}, {"uuid": "cb382a11-823b-44e9-8f73-61282f206bfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39193", "type": "seen", "source": "https://t.me/cibsecurity/71858", "content": "\u203c CVE-2023-39193 \u203c\n\nA flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-09T22:16:11.000000Z"}, {"uuid": "1b0d42ab-cfb0-4e8b-8b97-864d940490fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39194", "type": "seen", "source": "https://t.me/cibsecurity/71851", "content": "\u203c CVE-2023-39194 \u203c\n\nA flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-09T22:16:03.000000Z"}, {"uuid": "e0463779-153f-4133-842d-bf2b2bb1ab9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39192", "type": "seen", "source": "https://t.me/cibsecurity/71849", "content": "\u203c CVE-2023-39192 \u203c\n\nA flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-09T22:16:01.000000Z"}, {"uuid": "c3c31753-60e0-4f24-a377-bc32253a7a6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39196", "type": "seen", "source": "https://t.me/ctinow/180714", "content": "https://ift.tt/NUpvg1o\nCVE-2023-39196", "creation_timestamp": "2024-02-07T14:21:45.000000Z"}, {"uuid": "64d01746-26da-4688-8c7c-f86b5a46d9d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39197", "type": "seen", "source": "https://t.me/ctinow/171669", "content": "https://ift.tt/GEZqY1u\nCVE-2023-39197", "creation_timestamp": "2024-01-23T04:21:55.000000Z"}, {"uuid": "77e366dc-9a3e-4d50-89dd-17b553a92228", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3919", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhuloxv2ny27", "content": "", "creation_timestamp": "2025-02-11T02:16:33.425165Z"}, {"uuid": "768a6f6f-8224-4cd9-b049-2782f4f9a2a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39190", "type": "seen", "source": "https://t.me/cibsecurity/67376", "content": "\u203c CVE-2023-39190 \u203c\n\n** REJECT ** CVE-2023-39190 was found to be a duplicate of CVE-2023-31436. Please see https://access.redhat.com/security/cve/CVE-2023-31436 for information about affected products and security errata.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-28T18:35:55.000000Z"}, {"uuid": "041c1b4a-8efb-4537-9690-8134cf4828df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39198", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-15", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}]}