Vulnerability Description
A use after free issue was discovered in driver/firewire in outbound_phy_packet_callback in the Linux Kernel. In this flaw a local attacker with special privilege may cause a use after free problem when queue_event() fails.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 5.18 |
Related Weaknesses (CWE)
References
- https://github.com/torvalds/linux/commit/b7c81f80246fac44077166f3e07103affe6db8fPatch
- https://github.com/torvalds/linux/commit/b7c81f80246fac44077166f3e07103affe6db8fPatch
FAQ
What is CVE-2023-3159?
CVE-2023-3159 is a vulnerability with a CVSS score of 6.7 (MEDIUM). A use after free issue was discovered in driver/firewire in outbound_phy_packet_callback in the Linux Kernel. In this flaw a local attacker with special privilege may cause a use after free problem wh...
How severe is CVE-2023-3159?
CVE-2023-3159 has been rated MEDIUM with a CVSS base score of 6.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-3159?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.