First published: Mon Apr 24 2023(Updated: )
A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=5.10<5.10.157 | |
Linux Linux kernel | >=5.11<5.15.81 | |
Linux Linux kernel | >=5.16<6.0.11 | |
Netapp Hci Baseboard Management Controller | =h300s | |
Netapp Hci Baseboard Management Controller | =h410c | |
Netapp Hci Baseboard Management Controller | =h410s | |
Netapp Hci Baseboard Management Controller | =h500s | |
Netapp Hci Baseboard Management Controller | =h700s | |
redhat/kernel | <6.1 | 6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2006 is a privilege escalation vulnerability in the Linux Kernel.
CVE-2023-2006 has a severity score of 8.8 out of 10.
Linux Kernel versions 5.10.0 to 5.10.157, 5.11.0 to 5.15.81, and 5.16.0 to 6.0.11 are affected by CVE-2023-2006.
CVE-2023-2006 allows local attackers to escalate privileges on affected installations of Linux Kernel.
Updating to Linux Kernel version 6.1 or applying the necessary security patches from Red Hat resolves CVE-2023-2006.