Vulnerability Details : CVE-2023-1074
A memory leak flaw was found in the Linux kernel's Stream Control Transmission Protocol. This issue may occur when a user starts a malicious networking service and someone connects to this service. This could allow a local user to starve resources, causing a denial of service.
Vulnerability category: Denial of service
Products affected by CVE-2023-1074
- cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-1074
0.01%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 1 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-1074
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-03-19 |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2023-1074
-
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2023-1074
-
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
[SECURITY] [DLA 3403-1] linux security update
-
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f
kernel/git/next/linux-next.git - The linux-next integration testing treeMailing List;Patch
-
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
[SECURITY] [DLA 3404-1] linux-5.10 security update
-
https://www.openwall.com/lists/oss-security/2023/01/23/1
oss-security - Linux Kernel: sctp: KASLR leak in inet_diag_msg_sctpasoc_fill()Mailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2023/11/05/4
oss-security - Re: Linux Kernel: sctp: KASLR leak in inet_diag_msg_sctpasoc_fill()
-
https://bugzilla.redhat.com/show_bug.cgi?id=2173430
2173430 – (CVE-2023-1074) CVE-2023-1074 kernel: sctp: fail if no bound addresses can be used for a given scopeIssue Tracking;Third Party Advisory
Jump to