Vulnerability Details : CVE-2023-33203
The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device.
Vulnerability category: Memory Corruption
Products affected by CVE-2023-33203
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-33203
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 25 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-33203
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.4
|
MEDIUM | CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
0.5
|
5.9
|
NIST |
CWE ids for CVE-2023-33203
-
The product contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-33203
-
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9
Mailing List;Release Notes
-
https://bugzilla.suse.com/show_bug.cgi?id=1210685
1210685 – VUL-0: kernel: Use after free bug in emac_remove due to race conditionIssue Tracking;Third Party Advisory
-
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75
kernel/git/torvalds/linux.git - Linux kernel source treeMailing List;Patch
-
https://bugzilla.redhat.com/show_bug.cgi?id=2192667
2192667 – (CVE-2023-2483) CVE-2023-2483 kernel: net: qcom/emac: race condition leading to use-after-free in emac_remove()Not Applicable
Jump to