SB20240531537 - NULL pointer dereference in Linux kernel core
Published: May 31, 2024 Updated: May 14, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) NULL pointer dereference (CVE-ID: CVE-2023-52523)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the BPF_CALL_4() function in net/core/sock_map.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/bc8b89b6963803a123f64aa9494155a037b3d728
- https://git.kernel.org/stable/c/b8f97e47b6fb84fcf2f5a22e725eefb6cf5070c2
- https://git.kernel.org/stable/c/ded6e448028f0f91b6af35985afca01fa02a9089
- https://git.kernel.org/stable/c/b80e31baa43614e086a9d29dc1151932b1bd7fc5
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.135
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.57
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.7
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6