#VU96132 NULL pointer dereference in Linux kernel - CVE-2023-52889
Published: August 19, 2024 / Updated: May 12, 2025
Vulnerability identifier: #VU96132
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2023-52889
CWE-ID: CWE-476
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Linux kernel
Linux kernel
Software vendor:
Linux Foundation
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the apparmor_socket_sock_rcv_skb() function in security/apparmor/lsm.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
External links
- https://git.kernel.org/stable/c/ead2ad1d9f045f26fdce3ef1644913b3a6cd38f2
- https://git.kernel.org/stable/c/6c920754f62cefc63fccdc38a062c7c3452e2961
- https://git.kernel.org/stable/c/46c17ead5b7389e22e7dc9903fd0ba865d05bda2
- https://git.kernel.org/stable/c/fce09ea314505a52f2436397608fa0a5d0934fb1
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.224
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.165
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.282
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.103
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.10.3
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.11
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.44