mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-30 18:04:30 +00:00
77 lines
2.7 KiB
JSON
77 lines
2.7 KiB
JSON
{
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2023-2006",
|
|
"ASSIGNER": "secalert@redhat.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "n/a",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Linux kernel's RxRPC network protocol",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "Fixed in kernel v6.1-rc7"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-362"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2189112",
|
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2189112"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://www.zerodayinitiative.com/advisories/ZDI-23-439/",
|
|
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-439/"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/torvalds/linux/commit/3bcd6c7eaa53",
|
|
"url": "https://github.com/torvalds/linux/commit/3bcd6c7eaa53"
|
|
},
|
|
{
|
|
"refsource": "CONFIRM",
|
|
"name": "https://security.netapp.com/advisory/ntap-20230609-0004/",
|
|
"url": "https://security.netapp.com/advisory/ntap-20230609-0004/"
|
|
}
|
|
]
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel."
|
|
}
|
|
]
|
|
}
|
|
} |