CVE-2023-1652
Summary
| CVE | CVE-2023-1652 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-03-29 21:15:07 UTC |
| Updated | 2026-05-12 10:16:39 UTC |
| Description | A use-after-free flaw was found in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c in the NFS filesystem in the Linux Kernel. This issue could allow a local attacker to crash the system or it may lead to a kernel information leak problem. |
Risk And Classification
Primary CVSS: v3.1 7.1 HIGH from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Problem Types: CWE-416 | CWE-416 CWE-416 | CWE-416 CWE-416 Use After Free
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 7.1 | HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H |
| 3.1 | ADP | DECLARED | 7.1 | HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H |
| 3.1 | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | Secondary | 7.1 | HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H |
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
NoneAvailability
HighCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Na | Linux Kernel | affected Kernel 6.2 RC5 | Not specified |
| ADP | Siemens | SIMATIC S7-1500 TM MFP - GNU/Linux Subsystem | affected * custom | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| cert-portal.siemens.com/productcert/html/ssa-265688.html | 0b142b55-0307-4c5a-b3c9-f314f3fb7c5e | cert-portal.siemens.com | |
| CVE-2023-1652 Linux Kernel Vulnerability in NetApp Products | NetApp Product Security | af854a3a-2127-422b-91ae-364da2661108 | security.netapp.com | Third Party Advisory |
| Red Hat Customer Portal - Access to 24x7 support and knowledge | af854a3a-2127-422b-91ae-364da2661108 | access.redhat.com | Issue Tracking, Patch, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 161066 Oracle Enterprise Linux Security Update for kernel (ELSA-2023-6583)
- 183893 Debian Security Update for linux (CVE-2023-1652)
- 199292 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6025-1)
- 199303 Ubuntu Security Notification for Linux kernel (HWE) Vulnerabilities (USN-6040-1)
- 199321 Ubuntu Security Notification for Linux kernel (Intel IoTG) Vulnerabilities (USN-6057-1)
- 199343 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6079-1)
- 199353 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6091-1)
- 199354 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6096-1)
- 199385 Ubuntu Security Notification for Linux kernel (Intel IoTG) Vulnerabilities (USN-6134-1)
- 242399 Red Hat Update for kernel security (RHSA-2023:6583)
- 755851 SUSE Enterprise Linux Security Update for the linux kernel (SUSE-SU-2023:2646-1)
- 906813 Common Base Linux Mariner (CBL-Mariner) Security Update for hyperv-daemons (26018-1)
- 906877 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (25962-1)
- 907068 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (25964-1)