Satheesh575555 / linux-4.1.15_CVE-2022-42703

Other
0 stars 0 forks source link

CVE-2023-42754 (Medium) detected in linuxlinux-4.6 - autoclosed #862

Closed mend-bolt-for-github[bot] closed 7 months ago

mend-bolt-for-github[bot] commented 9 months ago

CVE-2023-42754 - Medium Severity Vulnerability

Vulnerable Library - linuxlinux-4.6

The Linux Kernel

Library home page: https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux

Found in HEAD commit: 5efa23eac0f04571d486a6f7706fccc426b46cac

Found in base branch: master

Vulnerable Source Files (1)

Vulnerability Details

A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.

Publish Date: 2023-10-05

URL: CVE-2023-42754

CVSS 3 Score Details (5.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.linuxkernelcves.com/cves/CVE-2023-42754

Release Date: 2023-10-05

Fix Resolution: v5.4.258,v5.10.198,v5.15.134,v6.1.56,v6.5.6


Step up your Open Source Security Game with Mend here