First published: Mon Apr 24 2023(Updated: )
The specific flaw exists within the DPT I2O Controller driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | <=4.19.249-2 | 4.19.289-2 5.10.197-1 5.10.205-2 6.1.66-1 6.1.69-1 6.5.13-1 6.6.9-1 |
debian/linux-5.10 | 5.10.197-1~deb10u1 | |
Linux Kernel | <6.0 | |
Debian GNU/Linux | =10.0 | |
Debian GNU/Linux | =11.0 | |
All of | ||
netapp h300s firmware | ||
netapp h300s | ||
All of | ||
NetApp H500S Firmware | ||
netapp h500s | ||
All of | ||
netapp h700s firmware | ||
netapp h700s | ||
All of | ||
netapp h410s firmware | ||
netapp h410s | ||
All of | ||
netapp h410c firmware | ||
netapp h410c | ||
netapp solidfire \& hci management node |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2007 has been classified as a high-severity vulnerability due to its potential to allow privilege escalation and execution of arbitrary code.
To remediate CVE-2023-2007, you should upgrade to the patched versions of the Linux kernel detailed in the advisory.
CVE-2023-2007 affects specific versions of the Linux kernel in Debian and related distributions.
While CVE-2023-2007 primarily requires local access for exploitation, it may be leveraged with other vulnerabilities to escalate privileges remotely.
Success in exploiting CVE-2023-2007 can lead to full system compromise, allowing attackers to execute arbitrary code with elevated privileges.