CVE-2023-1390
Summary
| CVE | CVE-2023-1390 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-03-16 21:15:00 UTC |
| Updated | 2023-11-07 04:03:00 UTC |
| Description | A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | All | All | All | All |
| Operating System | Linux | Linux Kernel | 5.11 | rc1 | All | All |
| Operating System | Linux | Linux Kernel | 5.11 | rc2 | All | All |
| Operating System | Linux | Linux Kernel | 5.11 | rc3 | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| CVE-2023-1390 Linux Kernel Vulnerability in NetApp Products | NetApp Product Security | CONFIRM | security.netapp.com | |
| tipc_analysis.md · GitHub | MISC | gist.github.com | |
| remy????: "Ever seen a network protocol polyglot? Let me sha…" - Infosec Exchange | infosec.exchange | ||
| tipc: fix NULL deref in tipc_link_xmit() · torvalds/linux@b774134 · GitHub | MISC | github.com | |
| remy????: "Ever seen a network protocol polyglot? Let me sha…" - Infosec Exchange | MISC | infosec.exchange | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 181692 Debian Security Update for linux (CVE-2023-1390)
- 199572 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6045-1)
- 241610 Red Hat Update for kernel (RHSA-2023:3190)
- 241629 Red Hat Update for kpatch-patch (RHSA-2023:3191)
- 241825 Red Hat Update for kpatch-patch (RHSA-2023:4146)
- 241831 Red Hat Update for kernel-rt (RHSA-2023:4126)
- 241832 Red Hat Update for kernel (RHSA-2023:4125)
- 379435 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX2-SA-2024:0012)
- 672935 EulerOS Security Update for kernel (EulerOS-SA-2023-1824)
- 673005 EulerOS Security Update for kernel (EulerOS-SA-2023-1873)
- 753901 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:1803-1)
- 753902 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:1800-1)
- 753903 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:1801-1)
- 753905 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:1811-1)
- 753914 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:1848-1)
- 754023 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:2232-1)
- 906743 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (25683-1)