CVE Vulnerabilities

CVE-2023-42754

NULL Pointer Dereference

Published: Oct 05, 2023 | Modified: Apr 30, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.

Weakness

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Affected Software

Name Vendor Start Version End Version
Linux_kernel Linux * 6.6 (excluding)
Linux_kernel Linux 6.6-rc1 (including) 6.6-rc1 (including)
Linux_kernel Linux 6.6-rc2 (including) 6.6-rc2 (including)

Potential Mitigations

References