First published: Thu Jan 04 2024(Updated: )
A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` global queue. This could lead to a denial of service condition or potential code execution.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Fedoraproject Fedora | =39 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6270 is classified with a moderate severity due to the potential for a use-after-free vulnerability.
To remediate CVE-2023-6270, update your Linux kernel to the patched versions such as 5.10.223-1, 6.1.123-1, or newer versions.
CVE-2023-6270 affects the Linux kernel and distributions like Fedora 39.
CVE-2023-6270 is a use-after-free vulnerability in the ATA over Ethernet driver of the Linux kernel.
Exploiting CVE-2023-6270 could allow an attacker to execute arbitrary code, leading to system compromise.