CVE Vulnerabilities

CVE-2023-2177

NULL Pointer Dereference

Published: Apr 20, 2023 | Modified: Apr 28, 2023
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

A null pointer dereference issue was found in the sctp network protocol in net/sctp/stream_sched.c in Linux Kernel. If stream_in allocation is failed, stream_out is freed which would further be accessed. A local user could use this flaw to crash the system or potentially cause a denial of service.

Weakness

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Affected Software

Name Vendor Start Version End Version
Linux_kernel Linux * 5.19 (excluding)
Linux_kernel Linux 5.19-rc1 (including) 5.19-rc1 (including)
Linux_kernel Linux 5.19-rc2 (including) 5.19-rc2 (including)
Linux_kernel Linux 5.19-rc3 (including) 5.19-rc3 (including)
Linux_kernel Linux 5.19-rc4 (including) 5.19-rc4 (including)
Linux_kernel Linux 5.19-rc5 (including) 5.19-rc5 (including)
Linux_kernel Linux 5.19-rc6 (including) 5.19-rc6 (including)
Linux_kernel Linux 5.19-rc7 (including) 5.19-rc7 (including)
Linux_kernel Linux 5.19-rc8 (including) 5.19-rc8 (including)

Potential Mitigations

References