cvelist/2023/2xxx/CVE-2023-2006.json

77 lines
2.7 KiB
JSON
Raw Normal View History

2023-04-12 16:00:35 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-2006",
2023-04-24 21:00:35 +00:00
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Linux kernel's RxRPC network protocol",
"version": {
"version_data": [
{
"version_value": "Fixed in kernel v6.1-rc7"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-362"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2189112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2189112"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-23-439/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-439/"
},
{
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/3bcd6c7eaa53",
"url": "https://github.com/torvalds/linux/commit/3bcd6c7eaa53"
2023-06-09 08:00:41 +00:00
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20230609-0004/",
"url": "https://security.netapp.com/advisory/ntap-20230609-0004/"
2023-04-24 21:00:35 +00:00
}
]
2023-04-12 16:00:35 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-04-24 21:00:35 +00:00
"value": "A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel."
2023-04-12 16:00:35 +00:00
}
]
}
}