CVE-2023-23039
low-risk
Published 2023-02-22
An issue was discovered in the Linux kernel through 6.2.0-rc2. drivers/tty/vcc.c has a race condition and resultant use-after-free if a physically proximate attacker removes a VCC device while calling open(), aka a race condition between vcc_open() and vcc_remove().
Do I need to act?
-
0.02% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.7/10
Medium
PHYSICAL
/ HIGH complexity
Affected Products (3)
Affected Vendors
References (2)
Mailing List
https://lkml.org/lkml/2023/1/1/169
Mailing List
https://lkml.org/lkml/2023/1/1/169
24
/ 100
low-risk
Severity
15/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
9/34 · Low