First published: Mon Jun 12 2023(Updated: )
A use after free issue was discovered in driver/firewire in outbound_phy_packet_callback in the Linux Kernel. In this flaw a local attacker with special privilege may cause a use after free problem when queue_event() fails.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <5.18 | |
Linux Kernel | =5.18 | |
Linux Kernel | =5.18-rc1 | |
Linux Kernel | =5.18-rc2 | |
Linux Kernel | =5.18-rc3 | |
Linux Kernel | =5.18-rc4 | |
Linux Kernel | =5.18-rc5 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.133-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3159 is classified as a high severity vulnerability due to the potential for local attackers to exploit it.
To fix CVE-2023-3159, upgrade to the patched versions of Linux Kernel, such as 5.10.223-1 or 6.1.123-1.
CVE-2023-3159 affects Linux Kernel versions up to 5.18, including specific release candidates.
No, CVE-2023-3159 can only be exploited by local attackers with special privileges.
CVE-2023-3159 is characterized as a use after free vulnerability in the FireWire driver of the Linux Kernel.