
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (CVE-2023-2007) was discovered in the DPT I2O Controller driver of the Linux kernel. The issue was identified by Lucas Leong and Reno Robert of Trend Micro Zero Day Initiative and was disclosed on April 24, 2023. The vulnerability stems from the lack of proper locking when performing operations on an object, affecting systems with the DPT I2O SCSI controller driver (NVD, Debian Security).
The vulnerability exists within the DPT I2O Controller driver and results from improper locking mechanisms during object operations. The issue has been assigned a CVSS score of 7.8 (HIGH) with the vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating a high severity local attack vector with low attack complexity (NetApp Security). The vulnerability was addressed by removing support for the I2OUSRCMD operation (Debian LTS).
Successful exploitation of this vulnerability could lead to privilege escalation and arbitrary code execution in the context of the kernel. The impact includes potential disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS) (NetApp Security).
The vulnerability has been fixed in multiple Linux distributions through security updates. For Debian 10 buster, the fix was implemented in version 4.19.289-1 and 5.10.197-1~deb10u1. The primary mitigation involved removing support for the I2OUSRCMD operation. The fix was also included in the Linux kernel version 6.0-rc1 (Debian LTS, GitHub Linux).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."