Race Condition Affecting torvalds/linux package, versions [,6.7-rc7)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.68% (71st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Race Condition vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-TORVALDSLINUX-6209260
  • published29 Jan 2024
  • disclosed21 Dec 2023
  • creditUnknown

Introduced: 21 Dec 2023

CVE-2023-6200  (opens in a new tab)
CWE-362  (opens in a new tab)

How to fix?

Upgrade torvalds/linux to version 6.7-rc7 or higher.

Overview

Affected versions of this package are vulnerable to Race Condition via the processing of ICMPv6 Router Advertisement packets. An attacker can cause arbitrary code execution by sending a specially crafted ICMPv6 router advertisement packet from an adjacent network.

Note: This is only exploitable if net.ipv6.conf.[NIC].accept_ra is enabled, which is disabled by default on Red Hat Enterprise Linux, limiting the attack to local vectors.

Workaround

Check net.ipv6.conf.[NIC].accept_ra param value with the command cat /proc/sys/net/ipv6/conf/default/accept_ra or /proc/sys/net/ipv6/conf/eth0/accept_ra (where eth0 is the name of the networking interface).

If you cannot run this or a similar command and parameter accept_ra is not available, then IPV6 is disabled. If IPV6 is not being used, it is possible to disable it completely, and there is instruction on how to do this.

References

CVSS Base Scores

version 3.1