CVE Vulnerabilities

CVE-2023-1382

NULL Pointer Dereference

Published: Apr 19, 2023 | Modified: Nov 07, 2023
CVSS 3.x
4.7
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

A data race flaw was found in the Linux kernel, between where con is allocated and con->sock is set. This issue leads to a NULL pointer dereference when accessing con->sock->sk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.

Weakness

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Affected Software

Name Vendor Start Version End Version
Linux_kernel Linux * 6.1 (excluding)
Linux_kernel Linux 6.1-rc1 (including) 6.1-rc1 (including)
Linux_kernel Linux 6.1-rc2 (including) 6.1-rc2 (including)
Linux_kernel Linux 6.1-rc3 (including) 6.1-rc3 (including)
Linux_kernel Linux 6.1-rc4 (including) 6.1-rc4 (including)
Linux_kernel Linux 6.1-rc5 (including) 6.1-rc5 (including)
Linux_kernel Linux 6.1-rc6 (including) 6.1-rc6 (including)

Potential Mitigations

References