A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3512-1 linux-5.10 security update
Debian DSA Debian DSA DSA-5448-1 linux security update
Debian DSA Debian DSA DSA-5453-1 linux security update
Ubuntu USN Ubuntu USN USN-6173-1 Linux kernel (OEM) vulnerabilities
Ubuntu USN Ubuntu USN USN-6412-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6416-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6416-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6416-3 Linux kernel (Raspberry Pi) vulnerabilities
Ubuntu USN Ubuntu USN USN-6445-1 Linux kernel (Intel IoTG) vulnerabilities
Ubuntu USN Ubuntu USN USN-6445-2 Linux kernel (Intel IoTG) vulnerabilities
Ubuntu USN Ubuntu USN USN-6466-1 Linux kernel (NVIDIA) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Apr 2025 15:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:enterprise_linux:9
cpe:/o:redhat:enterprise_linux:9

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-02T06:12:20.503Z

Reserved: 2023-04-18T00:00:00

Link: CVE-2023-2156

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-05-09T22:15:10.133

Modified: 2024-11-21T07:58:02.757

Link: CVE-2023-2156

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-05-04T00:00:00Z

Links: CVE-2023-2156 - Bugzilla

cve-icon OpenCVE Enrichment

No data.