CVE-2023-33203
Published on: Not Yet Published
Last Modified on: 05/23/2023 01:15:00 PM UTC
The following vulnerability was found:
The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device.
- CVE-2023-33203 has been assigned by
[email protected] to track the vulnerability
CVE References
Description | Tags ⓘ | Link |
---|---|---|
2192667 – (CVE-2023-2483) CVE-2023-2483 kernel: net: qcom/emac: race condition leading to use-after-free in emac_remove() | bugzilla.redhat.com text/html |
![]() |
cdn.kernel.org text/plain |
![]() | |
1210685 – VUL-0: kernel: Use after free bug in emac_remove due to race condition | bugzilla.suse.com text/html |
![]() |
kernel/git/torvalds/linux.git - Linux kernel source tree | git.kernel.org text/html |
![]() |
Related QID Numbers
- 181848 Debian Security Update for linux (CVE-2023-33203)
- 199422 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6175-1)
- 199437 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6186-1)
- 199650 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6284-1)
- 199669 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6301-1)
- 199670 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6300-1)
- 673261 EulerOS Security Update for kernel (EulerOS-SA-2023-2614)
- 906968 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (26850-1)
- 906989 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (26796-1)
There are no known software configurations (CPEs) currently associated with this CVE
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2023-33203 : The #Linux #kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/e… twitter.com/i/web/status/1… | 2023-05-18 08:06:51 |