The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-37373 | The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device. |
Ubuntu USN |
USN-6175-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6186-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6284-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6300-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6301-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6311-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6312-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6314-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6331-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-6332-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-6337-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-6347-1 | Linux kernel (Azure CVM) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 05 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-05-05T15:57:42.077Z
Reserved: 2023-05-18T00:00:00.000Z
Link: CVE-2023-33203
Updated: 2024-08-02T15:39:35.885Z
Status : Modified
Published: 2023-05-18T08:15:08.723
Modified: 2025-05-05T16:15:40.460
Link: CVE-2023-33203
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN