Vulnerability Description
A flaw was found in the Linux kernel's netdevsim device driver, within the scheduling of events. This issue results from the improper management of a reference count. This may allow an attacker to create a denial of service condition on the system.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 6.0 |
| Redhat | Enterprise Linux | 9.0 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=2189137Issue TrackingPatchThird Party Advisory
- https://github.com/torvalds/linux/commit/180a6a3ee60aPatch
- https://www.zerodayinitiative.com/advisories/ZDI-CAN-17811/Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=2189137Issue TrackingPatchThird Party Advisory
- https://github.com/torvalds/linux/commit/180a6a3ee60aPatch
- https://www.zerodayinitiative.com/advisories/ZDI-CAN-17811/Third Party AdvisoryVDB Entry
FAQ
What is CVE-2023-2019?
CVE-2023-2019 is a vulnerability with a CVSS score of 4.4 (MEDIUM). A flaw was found in the Linux kernel's netdevsim device driver, within the scheduling of events. This issue results from the improper management of a reference count. This may allow an attacker to cre...
How severe is CVE-2023-2019?
CVE-2023-2019 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-2019?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Redhat Enterprise Linux.