vulnerability
Ubuntu: (CVE-2023-2006): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:M/Au:S/C:C/I:C/A:C) | Apr 24, 2023 | Nov 19, 2024 | Mar 27, 2026 |
Severity
7
CVSS
(AV:L/AC:M/Au:S/C:C/I:C/A:C)
Published
Apr 24, 2023
Added
Nov 19, 2024
Modified
Mar 27, 2026
Description
A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.
Solutions
ubuntu-upgrade-linuxubuntu-upgrade-linux-awsubuntu-upgrade-linux-aws-5-15ubuntu-upgrade-linux-azureubuntu-upgrade-linux-azure-5-15ubuntu-upgrade-linux-azure-5-19ubuntu-upgrade-linux-azure-fdeubuntu-upgrade-linux-azure-fde-5-15ubuntu-upgrade-linux-bluefieldubuntu-upgrade-linux-gcpubuntu-upgrade-linux-gcp-5-15ubuntu-upgrade-linux-gkeubuntu-upgrade-linux-gke-5-15ubuntu-upgrade-linux-gkeopubuntu-upgrade-linux-gkeop-5-15ubuntu-upgrade-linux-hwe-5-15ubuntu-upgrade-linux-hwe-5-19ubuntu-upgrade-linux-ibmubuntu-upgrade-linux-intel-iot-realtimeubuntu-upgrade-linux-intel-iotgubuntu-upgrade-linux-intel-iotg-5-15ubuntu-upgrade-linux-kvmubuntu-upgrade-linux-lowlatencyubuntu-upgrade-linux-lowlatency-hwe-5-15ubuntu-upgrade-linux-lowlatency-hwe-5-19ubuntu-upgrade-linux-nvidiaubuntu-upgrade-linux-oracleubuntu-upgrade-linux-oracle-5-15ubuntu-upgrade-linux-raspiubuntu-upgrade-linux-realtimeubuntu-upgrade-linux-riscvubuntu-upgrade-linux-riscv-5-15
References
- CVE-2023-2006
- https://attackerkb.com/topics/CVE-2023-2006
- CWE-362
- EUVD-EUVD-2023-33536
- https://bugzilla.redhat.com/show_bug.cgi?id=2189112
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2023-33536
- https://github.com/torvalds/linux/commit/3bcd6c7eaa53
- https://www.cve.org/CVERecord?id=CVE-2023-2006
- https://www.zerodayinitiative.com/advisories/ZDI-23-439/
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.