Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-45863

Опубликовано: 14 окт. 2023
Источник: debian
EPSS Низкий

Описание

An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.1.20-1package

Примечания

  • https://git.kernel.org/linus/3bb2a01caa813d3a1845d378bbe4169ef280d394 (6.3-rc1)

EPSS

Процентиль: 1%
0.00009
Низкий

Связанные уязвимости

CVSS3: 6.4
ubuntu
больше 1 года назад

An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.

CVSS3: 6.4
redhat
больше 2 лет назад

An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.

CVSS3: 6.4
nvd
больше 1 года назад

An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.

CVSS3: 6.4
github
больше 1 года назад

An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.

CVSS3: 6.4
fstec
больше 2 лет назад

Уязвимость функции fill_kobj_path() ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации.

EPSS

Процентиль: 1%
0.00009
Низкий