A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2189112 | Issue Tracking Patch Third Party Advisory |
https://github.com/torvalds/linux/commit/3bcd6c7eaa53 | Patch |
https://security.netapp.com/advisory/ntap-20230609-0004/ | Patch Third Party Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-23-439/ | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2189112 | Issue Tracking Patch Third Party Advisory |
https://github.com/torvalds/linux/commit/3bcd6c7eaa53 | Patch |
https://security.netapp.com/advisory/ntap-20230609-0004/ | Patch Third Party Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-23-439/ | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2023-04-24 21:15
Updated : 2025-04-23 17:16
NVD link : CVE-2023-2006
Mitre link : CVE-2023-2006
CVE.ORG link : CVE-2023-2006
JSON object : View
Products Affected
linux
- linux_kernel
netapp
- hci_baseboard_management_controller
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')