7
CVSSv3

CVE-2023-1077

Published: 27/03/2023 Updated: 12/01/2024
CVSS v3 Base Score: 7 | Impact Score: 5.9 | Exploitability Score: 1
VMScore: 0

Vulnerability Summary

kernel: Type confusion in pick_next_rt_entity(), which can result in memory corruption. (CVE-2023-1077) do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel up to and including 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference). (CVE-2023-28466)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

debian debian linux 10.0

netapp a700s_firmware -

netapp 8300_firmware -

netapp 8700_firmware -

netapp a400_firmware -

netapp c400_firmware -

netapp h300s_firmware -

netapp h500s_firmware -

netapp h700s_firmware -

netapp h410s_firmware -

netapp h410c_firmware -

Vendor Advisories

kernel: Type confusion in pick_next_rt_entity(), which can result in memory corruption (CVE-2023-1077) do_tls_getsockopt in net/tls/tls_mainc in the Linux kernel through 626 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference) (CVE-2023-28466) ...
A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1 An attacker at L2 with code execution can execute code on an indirect branch on the ...
A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1 An attacker at L2 with code execution can execute code on an indirect branch on the ...
kernel: Type confusion in pick_next_rt_entity(), which can result in memory corruption (CVE-2023-1077) do_tls_getsockopt in net/tls/tls_mainc in the Linux kernel through 626 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference) (CVE-2023-28466) ...
kernel: Type confusion in pick_next_rt_entity(), which can result in memory corruption (CVE-2023-1077) do_tls_getsockopt in net/tls/tls_mainc in the Linux kernel through 626 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference) (CVE-2023-28466) ...
A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1 An attacker at L2 with code execution can execute code on an indirect branch on the ...