PatchSiren cyber security CVE debrief
CVE-2023-6121 Redhat CVE debrief
CVE-2023-6121 is a Linux kernel NVMe-oF/TCP issue that can expose kernel memory contents through an out-of-bounds read. According to the supplied source description, a crafted TCP packet may trigger a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the kernel ring buffer (dmesg). NVD classifies the weakness as CWE-125 and rates it CVSS 4.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
- Vendor
- Redhat
- Product
- CVE-2023-6121
- CVSS
- MEDIUM 4.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2023-11-16
- Original CVE updated
- 2026-05-12
- Advisory published
- 2023-11-16
- Advisory updated
- 2026-05-12
Who should care
Linux administrators and platform teams running NVMe-over-Fabrics over TCP, especially on distributions or appliances that ship affected Linux kernel builds. Based on the source corpus, Red Hat Enterprise Linux 6.0, 7.0, 8.0, and 9.0 are listed as vulnerable CPE criteria, and downstream vendors also reference the issue in their advisories.
Technical summary
The vulnerability is an out-of-bounds read in the NVMe-oF/TCP subsystem of the Linux kernel. The supplied description says a remote attacker may send a crafted TCP packet that can trigger a heap-based buffer overflow, causing kmalloc data to be printed and potentially leaked to dmesg. NVD maps the issue to CWE-125 and gives it a network-reachable CVSS vector of AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N, indicating low-privilege access is required and the primary impact is limited confidentiality leakage.
Defensive priority
Medium. The issue is network-triggerable and can expose kernel memory contents, but the supplied CVSS vector indicates limited confidentiality impact and no integrity or availability impact. Prioritize systems that expose NVMe-oF/TCP services or rely on kernel builds identified by vendor advisories.
Recommended defensive actions
- Apply vendor kernel updates or errata referenced for CVE-2023-6121 as soon as practical.
- Prioritize externally reachable NVMe-oF/TCP hosts and storage nodes for patching.
- Review downstream vendor advisories and issue tracking referenced in the source corpus to confirm the exact fixed builds for your distribution.
- If immediate patching is not possible, reduce exposure of NVMe-oF/TCP endpoints to only trusted management or storage networks.
- Validate that logging and monitoring coverage includes unexpected kernel-ring-buffer messages on affected systems.
Evidence notes
All claims are grounded in the supplied NVD-derived source item and its listed references. The source description states the issue is an out-of-bounds read in Linux NVMe-oF/TCP that may leak kmalloc data into dmesg. The metadata lists CWE-125, CVSS vector AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N, and vulnerable CPE criteria for Red Hat Enterprise Linux 6.0, 7.0, 8.0, and 9.0. The reference set also includes Red Hat errata, a Red Hat bug tracker entry, Debian LTS, and Siemens advisories, showing downstream vendor handling in the corpus. Published date used: 2023-11-16; modified date used: 2026-05-12.
Official resources
-
CVE-2023-6121 CVE record
CVE.org
-
CVE-2023-6121 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
- Source reference
- Source reference
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Third Party Advisory
-
Source reference
af854a3a-2127-422b-91ae-364da2661108
-
Source reference
0b142b55-0307-4c5a-b3c9-f314f3fb7c5e
Public vulnerability disclosure date in the supplied timeline: 2023-11-16. This debrief is based only on the supplied source corpus and official links listed there; no exploit details are provided.