2023-05-18 10:00:39 +00:00

28 lines
898 B
JSON

{
"id": "CVE-2023-33203",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-18T08:15:08.723",
"lastModified": "2023-05-18T08:15:08.723",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1210685",
"source": "cve@mitre.org"
},
{
"url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9",
"source": "cve@mitre.org"
},
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75",
"source": "cve@mitre.org"
}
]
}