Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-58448 | A race condition was found in the Linux Kernel. Under certain conditions, an unauthenticated attacker from an adjacent network could send an ICMPv6 router advertisement packet, causing arbitrary code execution. |
Solution
No solution given by the vendor.
Workaround
The remote attack is potentially possible in the local network only. It is not possible if param net.ipv6.conf.[NIC].accept_ra disabled. Check this param value with the command cat /proc/sys/net/ipv6/conf/default/accept_ra or /proc/sys/net/ipv6/conf/eth0/accept_ra (where eth0 is the name of the networking interface). If you cannot run this or a similar command and parameter accept_ra is not available, then IPV6 is disabled. If IPV6 is not being used, it is possible to disable it completely, and there is instruction on how to do this: https://access.redhat.com/solutions/8709
Thu, 05 Jun 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-06-05T19:45:49.317Z
Reserved: 2023-11-20T09:44:39.245Z
Link: CVE-2023-6200

Updated: 2024-08-02T08:21:18.007Z

Status : Modified
Published: 2024-01-28T13:15:07.817
Modified: 2024-11-21T08:43:20.507
Link: CVE-2023-6200


No data.