Vulnerability Description
A flaw was found in the MCTP protocol in the Linux kernel. The function mctp_unregister() reclaims the device's relevant resource when a netcard detaches. However, a running routine may be unaware of this and cause the use-after-free of the mdev->addrs object, potentially leading to a denial of service.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.15, <= 5.17 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2023/07/02/1Mailing ListPatchThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2217915Issue TrackingPatchThird Party Advisory
- https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a026Patch
- http://www.openwall.com/lists/oss-security/2023/07/02/1Mailing ListPatchThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2217915Issue TrackingPatchThird Party Advisory
- https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a026Patch
FAQ
What is CVE-2023-3439?
CVE-2023-3439 is a vulnerability with a CVSS score of 4.7 (MEDIUM). A flaw was found in the MCTP protocol in the Linux kernel. The function mctp_unregister() reclaims the device's relevant resource when a netcard detaches. However, a running routine may be unaware of ...
How severe is CVE-2023-3439?
CVE-2023-3439 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-3439?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.