Bug 2218618 (CVE-2023-3338) - CVE-2023-3338 kernel: DECnet: crash due to a NULL pointer dereference in the dn_nsp_send function
Summary: CVE-2023-3338 kernel: DECnet: crash due to a NULL pointer dereference in the ...
Alias: CVE-2023-3338
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
: TRIAGE-CVE-2023-3338 (view as bug list)
Depends On: 2218619
Blocks: 2216157 2217449
TreeView+ depends on / blocked
Reported: 2023-06-29 16:58 UTC by Alex
Modified: 2023-07-19 13:10 UTC (History)
46 users (show)

Fixed In Version: kernel 6.5-rc1
Doc Type: If docs needed, set a value
Doc Text:
A null pointer dereference flaw was found in the Linux kernel's DECnet networking protocol. This issue could allow a remote user to crash the system.
Clone Of:
Last Closed: 2023-06-29 21:18:37 UTC

Attachments (Terms of Use)

Description Alex 2023-06-29 16:58:46 UTC
A flaw in the Linux Kernel found. While attempting to ping localhost by sending a Hello message to a local DECnet socket, Null Pointer Dereference happens in the dn_nsp_send function (net/decnet/dn_nsp_out.c). 

The bug happens only for systems where legacy code enabled (Kernel config param CONFIG_DECNET), because the DECnet subsystem has been officially removed from all longterm and stable kernel series, starting from 4.14.319, 4.19.287, 5.4.248, 5.10.185 and 5.15.118.


Comment 1 Alex 2023-06-29 16:59:34 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2218619]

Comment 2 Product Security DevOps Team 2023-06-29 21:18:32 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):


Comment 5 Justin M. Forbes 2023-07-03 17:56:11 UTC
DECnet support was removed upstream with the 6.1 kernel series.

Comment 6 Alex 2023-07-19 13:10:21 UTC
*** Bug 2217451 has been marked as a duplicate of this bug. ***

Note You need to log in before you can comment on or make changes to this bug.