Satheesh575555 / linux-4.1.15_CVE-2023-28772

Other
0 stars 1 forks source link

CVE-2023-42754 (Medium) detected in linuxlinux-4.6 #869

Open mend-bolt-for-github[bot] opened 8 months ago

mend-bolt-for-github[bot] commented 8 months ago

CVE-2023-42754 - Medium Severity Vulnerability

Vulnerable Library - linuxlinux-4.6

The Linux Kernel

Library home page: https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux

Found in HEAD commit: 63ac601c421ad3f087ec68a99300cc5058d1cc54

Found in base branch: master

Vulnerable Source Files (1)

Vulnerability Details

A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.

Publish Date: 2023-10-05

URL: CVE-2023-42754

CVSS 3 Score Details (5.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.linuxkernelcves.com/cves/CVE-2023-42754

Release Date: 2023-10-05

Fix Resolution: v5.4.258,v5.10.198,v5.15.134,v6.1.56,v6.5.6


Step up your Open Source Security Game with Mend here

mend-bolt-for-github[bot] commented 7 months ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.