First published: Tue Apr 18 2023(Updated: )
A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.1 | 6.1 |
Linux Kernel | <6.1 | |
Linux Kernel | =6.1 | |
Linux Kernel | =6.1-rc1 | |
Linux Kernel | =6.1-rc2 | |
Linux Kernel | =6.1-rc3 | |
Linux Kernel | =6.1-rc4 | |
Linux Kernel | =6.1-rc5 | |
Linux Kernel | =6.1-rc6 | |
Linux Kernel | =6.1-rc7 | |
Linux Kernel | =6.1-rc8 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager | <=ISVG 10.0.2 |
https://lore.kernel.org/lkml/CAO4mrfcV_07hbj8NUuZrA8FH-kaRsrFy-2metecpTuE5kKHn5w@mail.gmail.com/
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2166 has a medium severity rating due to its potential to crash the system or cause a denial of service.
To fix CVE-2023-2166, update the Linux kernel to version 6.1 or later.
CVE-2023-2166 affects users running Linux kernel versions prior to 6.1, as well as certain versions of IBM Security Verify Governance software.
CVE-2023-2166 is caused by a null pointer dereference in the CAN protocol implementation in the Linux kernel.
CVE-2023-2166 requires local access to exploit, as it involves a flaw in the kernel's CAN frame processing.