A NULL pointer dereference vulnerability was found in netlink_dump. This issue can occur when the Netlink socket receives the message(sendmsg) for the XFRM_MSG_GETSA, XFRM_MSG_GETPOLICY type message, and the DUMP flag is set and can cause a denial of service or possibly another unspecified impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is unlikely.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2023-3106 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2221501 | Issue Tracking Patch Third Party Advisory |
https://github.com/torvalds/linux/commit/1ba5bf993c6a3142e18e68ea6452b347f9cb5635 | Patch |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2023-07-12T08:27:58.635Z
Updated: 2024-04-25T11:44:28.571Z
Reserved: 2023-06-05T13:55:28.745Z
Link: CVE-2023-3106
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-07-12T09:15:14.550
Modified: 2024-02-15T16:03:47.757
Link: CVE-2023-3106
JSON object: View
Redhat Information
No data.
CWE