A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3512-1 | linux-5.10 security update |
Debian DSA |
DSA-5448-1 | linux security update |
Debian DSA |
DSA-5453-1 | linux security update |
Ubuntu USN |
USN-6173-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6412-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6416-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6416-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6416-3 | Linux kernel (Raspberry Pi) vulnerabilities |
Ubuntu USN |
USN-6445-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6445-2 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6466-1 | Linux kernel (NVIDIA) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 16 Apr 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:9 |
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-02T06:12:20.503Z
Reserved: 2023-04-18T00:00:00
Link: CVE-2023-2156
No data.
Status : Modified
Published: 2023-05-09T22:15:10.133
Modified: 2024-11-21T07:58:02.757
Link: CVE-2023-2156
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN