{"api_version":"1","generated_at":"2026-04-22T23:52:01+00:00","cve":"CVE-2023-2007","urls":{"html":"https://cve.report/CVE-2023-2007","api":"https://cve.report/api/cve/CVE-2023-2007.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-2007","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-2007"},"summary":{"title":"CVE-2023-2007","description":"The specific flaw exists within the DPT I2O Controller driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2023-04-24 23:15:00","updated_at":"2024-02-01 01:39:00"},"problem_types":["CWE-667"],"metrics":[],"references":[{"url":"https://security.netapp.com/advisory/ntap-20240119-0011/","name":"https://security.netapp.com/advisory/ntap-20240119-0011/","refsource":"","tags":["Third Party Advisory"],"title":"CVE-2023-2007 Linux Kernel Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html","name":"[debian-lts-announce] 20230727 [SECURITY] [DLA 3508-1] linux security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3508-1] linux security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2023/dsa-5480","name":"DSA-5480","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-5480-1 linux","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/torvalds/linux/commit/b04e75a4a8a81887386a0d2dbf605a48e779d2a0","name":"https://github.com/torvalds/linux/commit/b04e75a4a8a81887386a0d2dbf605a48e779d2a0","refsource":"MISC","tags":[],"title":"scsi: dpt_i2o: Remove obsolete driver · torvalds/linux@b04e75a · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","name":"[debian-lts-announce] 20231019 [SECURITY] [DLA 3623-1] linux-5.10 security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3623-1] linux-5.10 security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-2007","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2007","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"2007","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"2007","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"2007","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"2007","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h300s","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"2007","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h300s_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"2007","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h410c","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"2007","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h410c_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"2007","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h410s","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"2007","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h410s_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"2007","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h500s","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"2007","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h500s_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"2007","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h700s","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"2007","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h700s_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"2007","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"solidfire_\\&_hci_management_node","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-2007","qid":"182642","title":"Debian Security Update for linux (CVE-2023-2007)"},{"cve":"CVE-2023-2007","qid":"6000136","title":"Debian Security Update for linux (DLA 3508-1)"},{"cve":"CVE-2023-2007","qid":"6000212","title":"Debian Security Update for linux (DSA 5480-1)"},{"cve":"CVE-2023-2007","qid":"6000265","title":"Debian Security Update for linux-5.10 (DLA 3623-1)"},{"cve":"CVE-2023-2007","qid":"754832","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3600-1)"},{"cve":"CVE-2023-2007","qid":"754833","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3599-1)"},{"cve":"CVE-2023-2007","qid":"754855","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3656-1)"},{"cve":"CVE-2023-2007","qid":"754863","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3680-1)"},{"cve":"CVE-2023-2007","qid":"754866","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3684-1)"},{"cve":"CVE-2023-2007","qid":"754867","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3683-1)"},{"cve":"CVE-2023-2007","qid":"754868","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3682-1)"},{"cve":"CVE-2023-2007","qid":"754869","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3681-1)"},{"cve":"CVE-2023-2007","qid":"754876","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3687-1)"},{"cve":"CVE-2023-2007","qid":"754883","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3705-1)"},{"cve":"CVE-2023-2007","qid":"754884","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3704-1)"},{"cve":"CVE-2023-2007","qid":"754899","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3599-2)"},{"cve":"CVE-2023-2007","qid":"754900","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3600-2)"},{"cve":"CVE-2023-2007","qid":"754901","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3704-2)"},{"cve":"CVE-2023-2007","qid":"754903","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3683-2)"},{"cve":"CVE-2023-2007","qid":"755026","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3964-1)"},{"cve":"CVE-2023-2007","qid":"755037","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3971-1)"},{"cve":"CVE-2023-2007","qid":"755038","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3969-1)"},{"cve":"CVE-2023-2007","qid":"755043","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3988-1)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2023-2007","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Linux kernel's DPT I2O Controller driver","version":{"version_data":[{"version_value":"Fixed in kernel v6.0-rc1"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-367"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://github.com/torvalds/linux/commit/b04e75a4a8a81887386a0d2dbf605a48e779d2a0","url":"https://github.com/torvalds/linux/commit/b04e75a4a8a81887386a0d2dbf605a48e779d2a0"},{"refsource":"MLIST","name":"[debian-lts-announce] 20230727 [SECURITY] [DLA 3508-1] linux security update","url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"},{"refsource":"DEBIAN","name":"DSA-5480","url":"https://www.debian.org/security/2023/dsa-5480"},{"refsource":"MLIST","name":"[debian-lts-announce] 20231019 [SECURITY] [DLA 3623-1] linux-5.10 security update","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"}]},"description":{"description_data":[{"lang":"eng","value":"The specific flaw exists within the DPT I2O Controller driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel."}]}},"nvd":{"publishedDate":"2023-04-24 23:15:00","lastModifiedDate":"2024-02-01 01:39:00","problem_types":["CWE-667"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}