
Cloud Vulnerability DB
A community-led vulnerabilities database
A flaw was discovered in the ATA over Ethernet (AoE) driver in the Linux kernel, identified as CVE-2023-6270. The vulnerability was disclosed on January 4, 2024, affecting Linux kernel systems with the AoE driver enabled. The issue stems from improper reference counting in the aoecmd_cfg_pkts() function when handling network device structures (Ubuntu Security, NVD).
The vulnerability occurs in the aoecmd_cfg_pkts() function of the AoE driver, which improperly updates the reference count (refcnt) on struct net_device. This implementation flaw can lead to a use-after-free condition when there is a race between freeing the struct and accessing it through the skbtxq global queue. The vulnerability has been assigned a CVSS 3 Severity Score of 7.0 (High) (Ubuntu Security).
The exploitation of this vulnerability could lead to a denial of service condition or potentially allow arbitrary code execution. The high severity rating indicates significant potential impact on system security, particularly concerning for systems utilizing the ATA over Ethernet driver (Ubuntu Security, Rapid7).
The vulnerability has been fixed in multiple Linux kernel versions across different distributions. Ubuntu has released patches for various kernel versions including 6.8.0-35.35 for 24.04 LTS, 6.5.0-44.44 for 23.10, and 5.15.0-112.122 for 22.04 LTS. Debian has also addressed this in version 5.10.216-1~deb10u1. Users are advised to update their kernel to the latest patched version (Ubuntu Security, Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."