Lucene search

K
cveRedhatCVE-2023-2177
HistoryApr 20, 2023 - 9:15 p.m.

CVE-2023-2177

2023-04-2021:15:08
CWE-476
redhat
web.nvd.nist.gov
355
cve
2023
2177
linux kernel
null pointer dereference
nvd
sctp
denial of service

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

5.8

Confidence

High

EPSS

0

Percentile

5.1%

A null pointer dereference issue was found in the sctp network protocol in net/sctp/stream_sched.c in Linux Kernel. If stream_in allocation is failed, stream_out is freed which would further be accessed. A local user could use this flaw to crash the system or potentially cause a denial of service.

Affected configurations

Nvd
Vulners
Node
linuxlinux_kernelRange<5.19
OR
linuxlinux_kernelMatch5.19rc1
OR
linuxlinux_kernelMatch5.19rc2
OR
linuxlinux_kernelMatch5.19rc3
OR
linuxlinux_kernelMatch5.19rc4
OR
linuxlinux_kernelMatch5.19rc5
OR
linuxlinux_kernelMatch5.19rc6
OR
linuxlinux_kernelMatch5.19rc7
OR
linuxlinux_kernelMatch5.19rc8
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
linuxlinux_kernel5.19cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
linuxlinux_kernel5.19cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
linuxlinux_kernel5.19cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*
linuxlinux_kernel5.19cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*
linuxlinux_kernel5.19cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*
linuxlinux_kernel5.19cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*
linuxlinux_kernel5.19cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*
linuxlinux_kernel5.19cpe:2.3:o:linux:linux_kernel:5.19:rc8:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "Linux",
    "versions": [
      {
        "version": "Linux Kernel prior to Kernel 5.19 RC17",
        "status": "affected"
      }
    ]
  }
]

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

5.8

Confidence

High

EPSS

0

Percentile

5.1%