Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2023-1855
PUBLISHED
More InfoOfficial Page
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
View Known Exploited Vulnerability (KEV) details
Published At-05 Apr, 2023 | 00:00
Updated At-12 Feb, 2025 | 16:08
Rejected At-
▼CVE Numbering Authority (CNA)

A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem.

Affected Products
Vendor
n/a
Product
Kernel
Versions
Affected
  • Linux kernel prior to Kernel 6.3 RC3
Problem Types
TypeCWE IDDescription
CWECWE-416CWE-416
Type: CWE
CWE ID: CWE-416
Description: CWE-416
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lore.kernel.org/all/20230318122758.2140868-1-linux%40roeck-us.net/
N/A
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
mailing-list
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
mailing-list
https://github.com/torvalds/linux/commit/cb090e64cf25602b9adaf32d5dfc9c8bec493cd1
N/A
Hyperlink: https://lore.kernel.org/all/20230318122758.2140868-1-linux%40roeck-us.net/
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
Resource:
mailing-list
Hyperlink: https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
Resource:
mailing-list
Hyperlink: https://github.com/torvalds/linux/commit/cb090e64cf25602b9adaf32d5dfc9c8bec493cd1
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lore.kernel.org/all/20230318122758.2140868-1-linux%40roeck-us.net/
x_transferred
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
mailing-list
x_transferred
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
mailing-list
x_transferred
https://github.com/torvalds/linux/commit/cb090e64cf25602b9adaf32d5dfc9c8bec493cd1
x_transferred
Hyperlink: https://lore.kernel.org/all/20230318122758.2140868-1-linux%40roeck-us.net/
Resource:
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
Resource:
mailing-list
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
Resource:
mailing-list
x_transferred
Hyperlink: https://github.com/torvalds/linux/commit/cb090e64cf25602b9adaf32d5dfc9c8bec493cd1
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
3.16.3MEDIUM
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
Version: 3.1
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found