A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-3710-1 | linux security update |
![]() |
EUVD-2023-47186 | A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system. |
![]() |
USN-6461-1 | Linux kernel (OEM) vulnerabilities |
![]() |
USN-6494-1 | Linux kernel vulnerabilities |
![]() |
USN-6494-2 | Linux kernel vulnerabilities |
![]() |
USN-6532-1 | Linux kernel vulnerabilities |
![]() |
USN-6534-1 | Linux kernel vulnerabilities |
![]() |
USN-6534-2 | Linux kernel vulnerabilities |
![]() |
USN-6534-3 | Linux kernel vulnerabilities |
![]() |
USN-6536-1 | Linux kernel vulnerabilities |
![]() |
USN-6537-1 | Linux kernel (GCP) vulnerabilities |
![]() |
USN-6548-1 | Linux kernel vulnerabilities |
![]() |
USN-6548-2 | Linux kernel vulnerabilities |
![]() |
USN-6548-3 | Linux kernel (Oracle) vulnerabilities |
![]() |
USN-6549-1 | Linux kernel vulnerabilities |
![]() |
USN-6549-2 | Linux kernel (GKE) vulnerabilities |
![]() |
USN-6549-3 | Linux kernel (Low Latency) vulnerabilities |
![]() |
USN-6548-4 | Linux kernel (GKE) vulnerabilities |
![]() |
USN-6548-5 | Linux kernel (IoT) vulnerabilities |
![]() |
USN-6549-4 | Linux kernel (Intel IoTG) vulnerabilities |
![]() |
USN-6549-5 | Linux kernel vulnerabilities |
![]() |
USN-6573-1 | Linux kernel (Azure) vulnerabilities |
![]() |
USN-6635-1 | Linux kernel (GCP) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
References
History
Fri, 22 Nov 2024 12:00:00 +0000
Fri, 13 Sep 2024 19:45:00 +0000

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-09-25T13:24:12.480Z
Reserved: 2023-09-13T11:03:47.962Z
Link: CVE-2023-42754

No data.

Status : Modified
Published: 2023-10-05T19:15:11.413
Modified: 2024-11-21T08:23:06.327
Link: CVE-2023-42754


No data.