First published: Mon Dec 11 2023(Updated: )
A null pointer dereference vulnerability was found in dpll_pin_parent_pin_set() in drivers/dpll/dpll_netlink.c in Digital Phase Locked Loop (DPLL) subsystem in the Linux kernel, which could be exploited to trigger denial of service. Refer: <a href="https://lore.kernel.org/netdev/20231211083758.1082853-1-jiri@resnulli.us/">https://lore.kernel.org/netdev/20231211083758.1082853-1-jiri@resnulli.us/</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Fedoraproject Fedora | =38 | |
Red Hat Enterprise Linux | =9.0 | |
IBM InfoSphere Guardium z/OS | <=12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6679 has a severity rating that indicates a potential denial of service risk due to a null pointer dereference vulnerability.
To fix CVE-2023-6679, update to the latest version of the Linux Kernel or applicable distributions that have patched this vulnerability.
CVE-2023-6679 affects the Linux Kernel, Fedora 38, Red Hat Enterprise Linux 9.0, and IBM InfoSphere Guardium up to version 12.0.
Exploiting CVE-2023-6679 could lead to a denial of service, causing affected systems to become unresponsive.
Currently, the best resolution for CVE-2023-6679 is to apply the latest updates or patches provided by your Linux distribution.