Vulnerability Description
A flaw was found in pfn_swap_entry_to_page in memory management subsystem in the Linux Kernel. In this flaw, an attacker with a local user privilege may cause a denial of service problem due to a BUG statement referencing pmd_t x.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | <= 5.13.19 |
| Redhat | Codeready Linux Builder | 8.0 |
| Redhat | Codeready Linux Builder For Arm64 | 8.0_aarch64 |
| Redhat | Codeready Linux Builder For Power Little Endian | 8.0_ppc64le |
| Redhat | Enterprise Linux | 8.0 |
| Redhat | Enterprise Linux For Arm 64 | 8.0_aarch64 |
| Redhat | Enterprise Linux For Ibm Z Systems | 8.0_s390x |
| Redhat | Enterprise Linux For Power Little Endian | 8.0_ppc64le |
| Redhat | Enterprise Linux For Real Time | 8.0 |
| Redhat | Enterprise Linux For Real Time For Nfv | 8.0 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2023:6901Third Party Advisory
- https://access.redhat.com/errata/RHSA-2023:7077Third Party Advisory
- https://access.redhat.com/errata/RHSA-2023:7539Third Party Advisory
- https://access.redhat.com/errata/RHSA-2024:0412
- https://access.redhat.com/security/cve/CVE-2023-4732Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2236982Issue TrackingThird Party Advisory
- https://access.redhat.com/errata/RHSA-2023:6901Third Party Advisory
- https://access.redhat.com/errata/RHSA-2023:7077Third Party Advisory
- https://access.redhat.com/errata/RHSA-2023:7539Third Party Advisory
- https://access.redhat.com/errata/RHSA-2024:0412
- https://access.redhat.com/security/cve/CVE-2023-4732Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2236982Issue TrackingThird Party Advisory
FAQ
What is CVE-2023-4732?
CVE-2023-4732 is a vulnerability with a CVSS score of 4.7 (MEDIUM). A flaw was found in pfn_swap_entry_to_page in memory management subsystem in the Linux Kernel. In this flaw, an attacker with a local user privilege may cause a denial of service problem due to a BUG ...
How severe is CVE-2023-4732?
CVE-2023-4732 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-4732?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Redhat Codeready Linux Builder, Redhat Codeready Linux Builder For Arm64, Redhat Codeready Linux Builder For Power Little Endian, Redhat Enterprise Linux.