An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.
References
Configurations
History
21 Nov 2024, 08:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.3 - Release Notes | |
References | () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3bb2a01caa813d3a1845d378bbe4169ef280d394 - Mailing List, Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html - | |
References | () https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html - |
11 Jan 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
11 Jan 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2023-10-14 21:15
Updated : 2024-11-21 08:27
NVD link : CVE-2023-45863
Mitre link : CVE-2023-45863
CVE.ORG link : CVE-2023-45863
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write