First published: Mon Jun 26 2023(Updated: )
A flaw in the Linux Kernel found. While attempting to ping localhost by sending a Hello message to a local DECnet socket, Null Pointer Dereference happens in the dn_nsp_send function (net/decnet/dn_nsp_out.c). The bug happens only for systems where legacy code enabled (Kernel config param CONFIG_DECNET), because the DECnet subsystem has been officially removed from all longterm and stable kernel series, starting from 4.14.319, 4.19.287, 5.4.248, 5.10.185 and 5.15.118. Reference: <a href="https://seclists.org/oss-sec/2023/q2/276">https://seclists.org/oss-sec/2023/q2/276</a>
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.5 | 6.5 |
Linux Kernel | =6.5-rc1 | |
Linux Kernel | <6.5 | |
netapp active iq unified manager vsphere | ||
Debian GNU/Linux | =10.0 | |
Debian GNU/Linux | =11.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3338 is classified as a high-severity vulnerability due to its potential impact on systems with legacy DECnet protocols enabled.
To mitigate CVE-2023-3338, update the Linux kernel to version 6.5 or any of the specified remedied versions for Debian systems.
CVE-2023-3338 affects systems running specific versions of the Linux kernel, particularly those with DECnet legacy code enabled.
Systems at risk from CVE-2023-3338 include those using Red Hat and Debian distributions with kernel versions prior to 6.5.
CVE-2023-3338 is a null pointer dereference vulnerability occurring in the dn_nsp_send function of the Linux kernel.