The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2192667 | Not Applicable |
https://bugzilla.suse.com/show_bug.cgi?id=1210685 | Issue Tracking Third Party Advisory |
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9 | Mailing List Release Notes |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75 | Mailing List Patch |
Configurations
History
No history.
Information
Published : 2023-05-18 08:15
Updated : 2023-05-26 16:52
NVD link : CVE-2023-33203
Mitre link : CVE-2023-33203
CVE.ORG link : CVE-2023-33203
JSON object : View
Products Affected
redhat
- enterprise_linux
linux
- linux_kernel
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')