A flaw was found in the networking subsystem of the Linux kernel within the
handling of the RPL protocol. This issue results from the lack of proper
handling of user-supplied data, which can lead to an assertion failure.
This may allow an unauthenticated remote attacker to create a denial of
service condition on the system.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 22.04 | noarch | linux | <Â 5.15.0-86.96 | UNKNOWN |
ubuntu | 23.04 | noarch | linux | <Â 6.2.0-34.34 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | <Â 5.15.0-1047.52 | UNKNOWN |
ubuntu | 23.04 | noarch | linux-aws | <Â 6.2.0-1013.13 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | <Â 5.15.0-1047.52~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.2 | <Â 6.2.0-1013.13~22.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | <Â 5.15.0-1049.56 | UNKNOWN |
ubuntu | 23.04 | noarch | linux-azure | <Â 6.2.0-1014.14 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure-5.15 | <Â 5.15.0-1049.56~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure-6.2 | <Â 6.2.0-1014.14~22.04.1 | UNKNOWN |
launchpad.net/bugs/cve/CVE-2023-2156
nvd.nist.gov/vuln/detail/CVE-2023-2156
security-tracker.debian.org/tracker/CVE-2023-2156
ubuntu.com/security/notices/USN-6173-1
ubuntu.com/security/notices/USN-6412-1
ubuntu.com/security/notices/USN-6416-1
ubuntu.com/security/notices/USN-6416-2
ubuntu.com/security/notices/USN-6416-3
ubuntu.com/security/notices/USN-6445-1
ubuntu.com/security/notices/USN-6445-2
ubuntu.com/security/notices/USN-6466-1
www.cve.org/CVERecord?id=CVE-2023-2156
www.interruptlabs.co.uk/articles/linux-ipv6-route-of-death
www.zerodayinitiative.com/advisories/ZDI-23-547/