A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2189112 | patch third party advisory issue tracking |
https://www.zerodayinitiative.com/advisories/ZDI-23-439/ | third party advisory vdb entry |
https://github.com/torvalds/linux/commit/3bcd6c7eaa53 | patch |
https://security.netapp.com/advisory/ntap-20230609-0004/ | third party advisory patch |