{ "id": "CVE-2023-33203", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-18T08:15:08.723", "lastModified": "2023-05-18T08:15:08.723", "vulnStatus": "Received", "descriptions": [ { "lang": "en", "value": "The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device." } ], "metrics": {}, "references": [ { "url": "https://bugzilla.suse.com/show_bug.cgi?id=1210685", "source": "cve@mitre.org" }, { "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9", "source": "cve@mitre.org" }, { "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75", "source": "cve@mitre.org" } ] }