First published: Sat Oct 14 2023(Updated: )
<a href="https://access.redhat.com/security/cve/CVE-2023-45863">CVE-2023-45863</a> --- An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write. <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3bb2a01caa813d3a1845d378bbe4169ef280d394">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3bb2a01caa813d3a1845d378bbe4169ef280d394</a> <a href="https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.3">https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.3</a>
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <6.2.3 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 | |
IBM InfoSphere Guardium z/OS | <=12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-45863.
The severity of CVE-2023-45863 is medium (6.4).
The affected software is the Linux kernel versions before 6.2.3.
The CWE classification of this vulnerability is CWE-362 and CWE-787.
With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.