The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-37373 | The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device. |
![]() |
USN-6175-1 | Linux kernel vulnerabilities |
![]() |
USN-6186-1 | Linux kernel vulnerabilities |
![]() |
USN-6284-1 | Linux kernel vulnerabilities |
![]() |
USN-6300-1 | Linux kernel vulnerabilities |
![]() |
USN-6301-1 | Linux kernel vulnerabilities |
![]() |
USN-6311-1 | Linux kernel vulnerabilities |
![]() |
USN-6312-1 | Linux kernel vulnerabilities |
![]() |
USN-6314-1 | Linux kernel vulnerabilities |
![]() |
USN-6331-1 | Linux kernel (Azure) vulnerabilities |
![]() |
USN-6332-1 | Linux kernel (Azure) vulnerabilities |
![]() |
USN-6337-1 | Linux kernel (Azure) vulnerabilities |
![]() |
USN-6347-1 | Linux kernel (Azure CVM) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 05 May 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-05-05T15:57:42.077Z
Reserved: 2023-05-18T00:00:00.000Z
Link: CVE-2023-33203

Updated: 2024-08-02T15:39:35.885Z

Status : Modified
Published: 2023-05-18T08:15:08.723
Modified: 2025-05-05T16:15:40.460
Link: CVE-2023-33203


No data.