The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-37373 The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device.
Ubuntu USN Ubuntu USN USN-6175-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6186-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6284-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6300-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6301-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6311-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6312-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6314-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6331-1 Linux kernel (Azure) vulnerabilities
Ubuntu USN Ubuntu USN USN-6332-1 Linux kernel (Azure) vulnerabilities
Ubuntu USN Ubuntu USN USN-6337-1 Linux kernel (Azure) vulnerabilities
Ubuntu USN Ubuntu USN USN-6347-1 Linux kernel (Azure CVM) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 05 May 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-05-05T15:57:42.077Z

Reserved: 2023-05-18T00:00:00.000Z

Link: CVE-2023-33203

cve-icon Vulnrichment

Updated: 2024-08-02T15:39:35.885Z

cve-icon NVD

Status : Modified

Published: 2023-05-18T08:15:08.723

Modified: 2025-05-05T16:15:40.460

Link: CVE-2023-33203

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-03-20T00:00:00Z

Links: CVE-2023-33203 - Bugzilla

cve-icon OpenCVE Enrichment

No data.