CVE-2023-0394

Published on: Not Yet Published

Last Modified on: 03/03/2023 01:15:00 AM UTC

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Certain versions of Linux Kernel from Linux contain the following vulnerability:

A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.

  • CVE-2023-0394 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 5.5 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE HIGH

CVE References

Description Tags Link
[SECURITY] [DLA 3349-1] linux-5.10 security update lists.debian.org
text/html
URL Logo MLIST [debian-lts-announce] 20230302 [SECURITY] [DLA 3349-1] linux-5.10 security update
kernel/git/torvalds/linux.git - Linux kernel source tree git.kernel.org
text/html
URL Logo MISC git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17
January 2023 Linux Kernel 6.1 Vulnerabilities in NetApp Products | NetApp Product Security security.netapp.com
text/html
URL Logo CONFIRM security.netapp.com/advisory/ntap-20230302-0005/

Related QID Numbers

  • 160505 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2023-12196)
  • 160506 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2023-12199)
  • 160508 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel-container (ELSA-2023-12200)
  • 160515 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel-container (ELSA-2023-12207)
  • 160516 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2023-12206)
  • 181491 Debian Security Update for linux (DSA 5324-1)
  • 181618 Debian Security Update for linux-5.10 (DLA 3349-1)
  • 199212 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5917-1)
  • 199218 Ubuntu Security Notification for Linux kernel (Azure) Vulnerabilities (USN-5927-1)
  • 199224 Ubuntu Security Notification for Linux kernel (Raspberry Pi) Vulnerabilities (USN-5934-1)
  • 199226 Ubuntu Security Notification for Linux kernel (GCP) Vulnerabilities (USN-5939-1)
  • 199230 Ubuntu Security Notification for Linux kernel (Raspberry Pi) Vulnerabilities (USN-5940-1)
  • 199239 Ubuntu Security Notification for Linux kernel (IBM) Vulnerabilities (USN-5951-1)
  • 354736 Amazon Linux Security Advisory for kernel : ALAS2-2023-1932
  • 354739 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.15-2023-013
  • 354741 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2023-026
  • 354775 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.4-2023-042
  • 354842 Amazon Linux Security Advisory for kernel : ALAS-2023-1706
  • 672747 EulerOS Security Update for kernel (EulerOS-SA-2023-1469)
  • 672802 EulerOS Security Update for kernel (EulerOS-SA-2023-1551)
  • 672806 EulerOS Security Update for kernel (EulerOS-SA-2023-1526)
  • 905358 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (13161)
  • 905367 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (13170)
  • 905371 Common Base Linux Mariner (CBL-Mariner) Security Update for hyperv-daemons (13168)
  • 905531 Common Base Linux Mariner (CBL-Mariner) Security Update for hyperv-daemons (13168-1)
  • 906070 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (13161-2)
  • 906415 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (13170-2)

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
LinuxLinux KernelAllAllAllAll
Operating
System
LinuxLinux Kernel6.2rc1AllAll
Operating
System
LinuxLinux Kernel6.2rc2AllAll
Operating
System
LinuxLinux Kernel6.2rc3AllAll
  • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*:
  • cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*:
  • cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*:

Social Mentions

Source Title Posted (UTC)
Twitter Icon @oss_security Re: null pointer dereference in Linux kernel: Posted by Rohit Keshri on Jan 18Hello Team, CVE-2023-0394 assigned. dlvr.it/ShLHtJ 2023-01-24 02:29:09
Twitter Icon @sidfm_jp Linux Kernel の IPv6 ソケットの処理にサービスを妨害される問題 (CVE-2023-0394) [44739] sid.softek.jp/content/show/4… #SIDfm #脆弱性情報 2023-01-25 07:00:14
Twitter Icon @CVEreport CVE-2023-0394 : A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the net… twitter.com/i/web/status/1… 2023-01-26 21:46:49
Twitter Icon @glytcher001 CVE-2023-0394 | Linux Kernel Network Subsystem net/ipv6/raw.c rawv6_push_pending_frames null pointer dereference dlvr.it/ShWMF8 2023-01-27 07:07:35
© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report