Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-2006

Опубликовано: 24 апр. 2023
Источник: debian
EPSS Низкий

Описание

A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.0.12-1package
linuxfixed5.10.158-1bullseyepackage
linuxnot-affectedbusterpackage

Примечания

  • https://www.zerodayinitiative.com/advisories/ZDI-23-439/

  • https://git.kernel.org/linus/3bcd6c7eaa53b56c3f584da46a1f7652e759d0e5 (6.1-rc7)

EPSS

Процентиль: 4%
0.00019
Низкий

Связанные уязвимости

CVSS3: 7
ubuntu
почти 3 года назад

A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.

CVSS3: 8.8
redhat
почти 3 года назад

A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.

CVSS3: 7
nvd
почти 3 года назад

A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.

CVSS3: 7
msrc
почти 3 года назад

Описание отсутствует

CVSS3: 7
github
почти 3 года назад

A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.

EPSS

Процентиль: 4%
0.00019
Низкий