NULL Pointer Dereference Affecting torvalds/linux package, versions [0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about NULL Pointer Dereference vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-TORVALDSLINUX-6114710
  • published10 Dec 2023
  • disclosed8 Dec 2023
  • creditXingyuan Mo (IceSword Lab)

Introduced: 8 Dec 2023

CVE-2023-6622  (opens in a new tab)
CWE-476  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

Affected versions of this package are vulnerable to NULL Pointer Dereference via the nft_dynset_init function in net/netfilter/nft_dynset.c in nf_tables. Note: This is exploitable only by an attacker with CAP_NET_ADMIN user privilege.

Workaround

This vulnerability can be mitigated by skipping the loading of the affected module netfilter onto the system until a fix is available. This can be done by using a blacklist mechanism to ensure the driver is not loaded at boot time.

CVSS Scores

version 3.1