First published: Thu Jan 12 2023(Updated: )
A use-after-free flaw was found in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c in the NFS filesystem in the Linux Kernel. This issue could allow a local attacker to crash the system or it may lead to a kernel information leak problem.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Kernel | <6.2 | 6.2 |
Linux Kernel | >=5.14<5.15.91 | |
Linux Kernel | >=5.16<6.1.9 | |
Linux Kernel | =6.2-rc1 | |
Linux Kernel | =6.2-rc2 | |
Linux Kernel | =6.2-rc3 | |
Linux Kernel | =6.2-rc4 | |
Red Hat Enterprise Linux | =9.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 | |
>=5.14<5.15.91 | ||
>=5.16<6.1.9 | ||
=6.2-rc1 | ||
=6.2-rc2 | ||
=6.2-rc3 | ||
=6.2-rc4 | ||
=9.0 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1652 has a high severity rating due to the potential for local attackers to crash the system or leak sensitive kernel information.
To fix CVE-2023-1652, update to the patched versions of the Linux Kernel, specifically versions 6.2 or any version above 5.15.91 compatible with the affected distributions.
CVE-2023-1652 affects various versions of the Linux Kernel, particularly those between 5.14 and 6.1.9, including specific Red Hat and Debian distributions.
CVE-2023-1652 is a use-after-free vulnerability affecting the NFS filesystem in the Linux Kernel.
CVE-2023-1652 is primarily a local vulnerability that can be exploited by local attackers with access to the system.