Логотип exploitDog
bind:CVE-2023-28577
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-28577

Количество 2

Количество 2

nvd логотип

CVE-2023-28577

больше 2 лет назад

In the function call related to CAM_REQ_MGR_RELEASE_BUF there is no check if the buffer is being used. So when a function called cam_mem_get_cpu_buf to get the kernel va to use, another thread can call CAM_REQ_MGR_RELEASE_BUF to unmap the kernel va which cause UAF of the kernel address.

CVSS3: 6.7
EPSS: Низкий
github логотип

GHSA-rjh6-h795-3mrj

больше 2 лет назад

In the function call related to CAM_REQ_MGR_RELEASE_BUF there is no check if the buffer is being used. So when a function called cam_mem_get_cpu_buf to get the kernel va to use, another thread can call CAM_REQ_MGR_RELEASE_BUF to unmap the kernel va which cause UAF of the kernel address.

CVSS3: 6.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-28577

In the function call related to CAM_REQ_MGR_RELEASE_BUF there is no check if the buffer is being used. So when a function called cam_mem_get_cpu_buf to get the kernel va to use, another thread can call CAM_REQ_MGR_RELEASE_BUF to unmap the kernel va which cause UAF of the kernel address.

CVSS3: 6.7
0%
Низкий
больше 2 лет назад
github логотип
GHSA-rjh6-h795-3mrj

In the function call related to CAM_REQ_MGR_RELEASE_BUF there is no check if the buffer is being used. So when a function called cam_mem_get_cpu_buf to get the kernel va to use, another thread can call CAM_REQ_MGR_RELEASE_BUF to unmap the kernel va which cause UAF of the kernel address.

CVSS3: 6.7
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу