5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1.7 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:S/C:N/I:N/A:P
0.0004 Low
EPSS
Percentile
5.3%
A memory leak flaw was found in the Linux kernel’s Stream Control
Transmission Protocol. This issue may occur when a user starts a malicious
networking service and someone connects to this service. This could allow a
local user to starve resources, causing a denial of service.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < 4.15.0-209.220 | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < 5.4.0-147.164 | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < 5.15.0-70.77 | UNKNOWN |
ubuntu | 22.10 | noarch | linux | < 5.19.0-42.43 | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < 4.4.0-239.273) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < 4.15.0-1154.167 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1100.108 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1034.38 | UNKNOWN |
ubuntu | 22.10 | noarch | linux-aws | < 5.19.0-1025.26 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-aws | < 4.4.0-1117.123) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
git.kernel.org/linus/458e279f861d3f61796894cd158b780765a1569f
launchpad.net/bugs/cve/CVE-2023-1074
nvd.nist.gov/vuln/detail/CVE-2023-1074
security-tracker.debian.org/tracker/CVE-2023-1074
ubuntu.com/security/notices/USN-5978-1
ubuntu.com/security/notices/USN-6001-1
ubuntu.com/security/notices/USN-6013-1
ubuntu.com/security/notices/USN-6014-1
ubuntu.com/security/notices/USN-6025-1
ubuntu.com/security/notices/USN-6027-1
ubuntu.com/security/notices/USN-6029-1
ubuntu.com/security/notices/USN-6030-1
ubuntu.com/security/notices/USN-6031-1
ubuntu.com/security/notices/USN-6032-1
ubuntu.com/security/notices/USN-6040-1
ubuntu.com/security/notices/USN-6057-1
ubuntu.com/security/notices/USN-6079-1
ubuntu.com/security/notices/USN-6091-1
ubuntu.com/security/notices/USN-6093-1
ubuntu.com/security/notices/USN-6096-1
ubuntu.com/security/notices/USN-6134-1
ubuntu.com/security/notices/USN-6222-1
ubuntu.com/security/notices/USN-6256-1
www.cve.org/CVERecord?id=CVE-2023-1074
www.openwall.com/lists/oss-security/2023/01/23/1
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1.7 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:S/C:N/I:N/A:P
0.0004 Low
EPSS
Percentile
5.3%