CVE-2023-1382

Updated: 2026-02-27 02:13:29.41002

Description:

A data race flaw was found in the Linux kernel, between where con is allocated and con->sock is set. This issue leads to a NULL pointer dereference when accessing con->sock->sk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x MEDIUM 4.7

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 4.7 MEDIUM Ignored 2023-11-21 04:11:54 This flaw is only reachable when the kernel’s TIPC protocol is enabled; by default the tipc module...
CentOS 6 ELS kernel 2.6.32 4.7 MEDIUM Ignored 2023-05-01 08:51:40 Ignored due to low severity
CentOS 7 ELS kernel 3.10.0 4.7 MEDIUM Ignored 2023-09-19 05:07:24 Ignored due to low severity
CentOS 8.4 ELS kernel 4.18.0 4.7 MEDIUM Ignored 2024-06-24 11:36:25 Ignored due to low severity
CentOS 8.5 ELS kernel 4.18.0 4.7 MEDIUM Ignored 2024-06-24 11:36:25 Ignored due to low severity
CentOS Stream 8 ELS kernel 4.18.0 4.7 MEDIUM Ignored 2025-01-28 02:25:57 Ignored due to low severity
CloudLinux 6 ELS kernel 2.6.32 4.7 MEDIUM Ignored 2023-05-01 08:51:40 Ignored due to low severity
Oracle Linux 6 ELS kernel 2.6.32 4.7 MEDIUM Ignored 2023-05-01 08:51:40 Ignored due to low severity
Ubuntu 16.04 ELS linux-hwe 4.15.0 4.7 MEDIUM Released CLSA-2024:1714065365 2024-04-25 21:53:43
Ubuntu 16.04 ELS linux 4.4.0 4.7 MEDIUM Released CLSA-2024:1714073393 2024-04-25 21:53:41
Total: 11