Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-45863

Опубликовано: 14 окт. 2023
Источник: debian
EPSS Низкий

Описание

An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.1.20-1package

Примечания

  • https://git.kernel.org/linus/3bb2a01caa813d3a1845d378bbe4169ef280d394 (6.3-rc1)

EPSS

Процентиль: 1%
0.0001
Низкий

Связанные уязвимости

CVSS3: 6.4
ubuntu
больше 2 лет назад

An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.

CVSS3: 6.4
redhat
около 3 лет назад

An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.

CVSS3: 6.4
nvd
больше 2 лет назад

An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.

CVSS3: 6.4
msrc
больше 2 лет назад

An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.

CVSS3: 6.4
github
больше 2 лет назад

An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.

EPSS

Процентиль: 1%
0.0001
Низкий