{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T13:07:58.987","vulnerabilities":[{"cve":{"id":"CVE-2023-1390","sourceIdentifier":"secalert@redhat.com","published":"2023-03-16T21:15:11.447","lastModified":"2025-04-23T17:16:25.377","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"secalert@redhat.com","type":"Secondary","description":[{"lang":"en","value":"CWE-1050"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.3","versionEndExcluding":"4.9.253","matchCriteriaId":"AF22C9B4-BCE0-4E42-8C4C-5DAE22C582DE"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"4.14.217","matchCriteriaId":"D777E229-ADCF-4C7F-A9F7-B2382137F407"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.15","versionEndExcluding":"4.19.170","matchCriteriaId":"671B1493-DB61-421B-B0A9-893B3A862EB8"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","versionEndExcluding":"5.4.92","matchCriteriaId":"2F6DB7A0-9052-479E-894D-15F862F4D3BF"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.10.10","matchCriteriaId":"AAA1C6A6-3B03-4EC3-935C-C9FA0B50DB70"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:5.11:rc1:*:*:*:*:*:*","matchCriteriaId":"18B1C9CE-F7E4-426B-A770-79F86AB5CC38"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:5.11:rc2:*:*:*:*:*:*","matchCriteriaId":"7A70E596-2EF7-4651-B2EF-2CEE31DB6893"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:5.11:rc3:*:*:*:*:*:*","matchCriteriaId":"18C82C96-2853-4DFE-93AD-F6E59B4129CA"}]}]}],"references":[{"url":"https:\/\/gist.github.com\/netspooky\/bee2d07022f6350bb88eaa48e571d9b5","source":"secalert@redhat.com","tags":["Third Party Advisory"]},{"url":"https:\/\/github.com\/torvalds\/linux\/commit\/b77413446408fdd256599daf00d5be72b5f3e7c6","source":"secalert@redhat.com","tags":["Patch","Vendor Advisory"]},{"url":"https:\/\/infosec.exchange\/%40_mattata\/109427999461122360","source":"secalert@redhat.com"},{"url":"https:\/\/security.netapp.com\/advisory\/ntap-20230420-0001\/","source":"secalert@redhat.com","tags":["Third Party Advisory"]},{"url":"https:\/\/gist.github.com\/netspooky\/bee2d07022f6350bb88eaa48e571d9b5","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https:\/\/github.com\/torvalds\/linux\/commit\/b77413446408fdd256599daf00d5be72b5f3e7c6","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https:\/\/infosec.exchange\/%40_mattata\/109427999461122360","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/security.netapp.com\/advisory\/ntap-20230420-0001\/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}