First published: Wed Sep 20 2023(Updated: )
A flaw was found in rsvp_change(). The root cause is an slab-out-of-bound access, but since the offset to the original pointer is an `unsign int` fully controlled by users, the behavior is usually a wild pointer access.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.3 | 6.3 |
Linux kernel | <6.3 | |
Red Hat Enterprise Linux | =8.0 | |
Linux Kernel | <6.3 | |
Debian Linux | =10.0 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.21-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-42755 is classified as a high severity vulnerability due to its potential for wild pointer access.
To mitigate CVE-2023-42755, update your kernel to version 6.3 or later if you are using Red Hat, or apply the recommended patches for affected Debian versions.
CVE-2023-42755 affects the Linux kernel versions up to 6.3 and specific versions of Red Hat Enterprise Linux and Debian.
CVE-2023-42755 is a slab-out-of-bounds access vulnerability found in the rsvp_change() function.
As of now, there is no public information indicating that CVE-2023-42755 is being actively exploited in the wild.