We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-6270

Kernel: aoe: improper reference count leads to use-after-free vulnerability



Description

A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` global queue. This could lead to a denial of service condition or potential code execution.

Reserved 2023-11-23 | Published 2024-01-04 | Updated 2024-10-22 | Assigner redhat


HIGH: 7.0CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Use After Free

Product status

Default status
unknown

Default status
unknown

Default status
unknown

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Timeline

2023-09-29:Reported to Red Hat.
2024-01-04:Made public.

References

access.redhat.com/security/cve/CVE-2023-6270 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2256786 (RHBZ#2256786) issue-tracking

lists.debian.org/debian-lts-announce/2024/06/msg00017.html

lists.debian.org/debian-lts-announce/2024/06/msg00020.html

cve.org (CVE-2023-6270)

nvd.nist.gov (CVE-2023-6270)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-6270

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.