Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-45863

Опубликовано: 14 окт. 2023
Источник: debian
EPSS Низкий

Описание

An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.1.20-1package

Примечания

  • https://git.kernel.org/linus/3bb2a01caa813d3a1845d378bbe4169ef280d394 (6.3-rc1)

EPSS

Процентиль: 1%
0.00009
Низкий

Связанные уязвимости

CVSS3: 6.4
ubuntu
около 2 лет назад

An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.

CVSS3: 6.4
redhat
почти 3 года назад

An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.

CVSS3: 6.4
nvd
около 2 лет назад

An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.

CVSS3: 6.4
msrc
около 2 лет назад

An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.

CVSS3: 6.4
github
около 2 лет назад

An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.

EPSS

Процентиль: 1%
0.00009
Низкий