| CVE ID | CVE-2023-2019 |
| CVSS SCORE | 5.3, AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H |
| AFFECTED VENDORS |
Linux |
| AFFECTED PRODUCTS |
Kernel |
| VULNERABILITY DETAILS |
This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the scheduling of events. The issue results from the improper management of a reference count. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. |
| ADDITIONAL DETAILS |
Linux has issued an update to correct this vulnerability. More details can be found at:
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=180a6a3ee60a |
| DISCLOSURE TIMELINE |
|
| CREDIT | Lucas Leong (@_wmliang_) of Trend Micro Zero Day Initiative |