{"id":"CVE-2023-2860","details":"An out-of-bounds read vulnerability was found in the SR-IPv6 implementation in the Linux kernel. The flaw exists within the processing of seg6 attributes. The issue results from the improper validation of user-supplied data, which can result in a read past the end of an allocated buffer. This flaw allows a privileged local user to disclose sensitive information on affected installations of the Linux kernel.","modified":"2026-03-15T22:46:40.029905Z","published":"2023-07-24T16:15:11.293Z","related":["SUSE-SU-2023:4343-1","SUSE-SU-2023:4414-1","SUSE-SU-2024:1642-1","SUSE-SU-2024:1644-1","SUSE-SU-2024:1650-1","SUSE-SU-2024:1659-1","SUSE-SU-2024:1663-1","SUSE-SU-2024:2189-1","SUSE-SU-2025:0231-1"],"references":[{"type":"ADVISORY","url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-18511"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2023-2860"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218122"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"5.19.19"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0-rc4"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-2860.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"}]}