First published: Mon Sep 18 2023(Updated: )
An integer overflow flaw was found in the Linux kernel. This issue leads to the kernel allocating `skb_shared_info` in the userspace, which is exploitable in systems without SMAP protection since `skb_shared_info` contains references to function pointers.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Kernel | <6.6 | 6.6 |
Linux Kernel | <=6.5.7 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.22-1 6.12.25-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-42752 is rated as a high-severity vulnerability due to the potential for exploitation leading to critical system compromise.
To resolve CVE-2023-42752, upgrade to the recommended kernel versions, including 6.6 for Red Hat or apply the specific patches listed in your distribution's advisory.
CVE-2023-42752 affects Linux Kernel versions up to 6.5.7 and notable Red Hat and Debian kernel versions listed in their security alerts.
Yes, CVE-2023-42752 can be exploited in systems without SMAP protection, leading to potential user space issues.
CVE-2023-42752 is an integer overflow flaw that results in inadequate kernel memory management, allowing for possible code execution attacks.