First published: Thu Jan 12 2023(Updated: )
A denial of service flaw was found in atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel. In this flaw a local attacker may cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results). Reference: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2965c7be0522eaa18808684b7b82b248515511b">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2965c7be0522eaa18808684b7b82b248515511b</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.2 | 6.2 |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager | <=ISVG 10.0.2 | |
Linux kernel | >=2.6.12<=6.1.4 | |
Debian | =11.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23455 is classified as a denial of service vulnerability in the Linux kernel.
To fix CVE-2023-23455, update the Linux kernel to version 6.2 or above.
CVE-2023-23455 affects various versions of the Linux kernel, IBM Security Verify Governance, and Identity Manager software components.
Yes, CVE-2023-23455 can be exploited by a local attacker, potentially leading to a denial of service.
CVE-2023-23455 impacts Linux kernel versions from 2.6.12 up to 6.1.4.