Lucene search

K
cve[email protected]CVE-2023-2006
HistoryApr 24, 2023 - 9:15 p.m.

CVE-2023-2006

2023-04-2421:15:09
CWE-362
web.nvd.nist.gov
37
cve-2023-2006
race condition
linux kernel
rxrpc
privilege escalation
arbitrary code execution
nvd

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

7.1 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.3%

A race condition was found in the Linux kernel’s RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.

Affected configurations

Vulners
NVD
Node
linuxmptcp_protocolRange6.1
VendorProductVersionCPE
linuxmptcp_protocol*cpe:2.3:o:linux:mptcp_protocol:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "Linux kernel's RxRPC network protocol",
    "versions": [
      {
        "version": "Fixed in kernel v6.1-rc7",
        "status": "affected"
      }
    ]
  }
]

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

7.1 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.3%