-

CVE-2023-54309

In the Linux kernel, the following vulnerability has been resolved:

tpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation

/dev/vtpmx is made visible before 'workqueue' is initialized, which can
lead to a memory corruption in the worst case scenario.

Address this by initializing 'workqueue' as the very first step of the
driver initialization.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 509d21f1c4bb9d35d397fca3226165b156a7639f
Version 6f99612e250041a2402d3b1694bccb149cd424a4
Status affected
Version < 04e8697d26613ccea760cf57eb20a5a27f788c0f
Version 6f99612e250041a2402d3b1694bccb149cd424a4
Status affected
Version < 86b9820395f226b8f33cbae9599deebf8af1ce72
Version 6f99612e250041a2402d3b1694bccb149cd424a4
Status affected
Version < 9ff7fcb3a2ed0e9b895bb5b4c13872d584a8815b
Version 6f99612e250041a2402d3b1694bccb149cd424a4
Status affected
Version < e08295290c53a3cf174c236721747a01b9550ae2
Version 6f99612e250041a2402d3b1694bccb149cd424a4
Status affected
Version < 99b998fb9d7d2d2d9dbb3e19db2d0ade02f5a604
Version 6f99612e250041a2402d3b1694bccb149cd424a4
Status affected
Version < 092db954e2c3c5ba6c0ce990c7da72cf8f3b9c51
Version 6f99612e250041a2402d3b1694bccb149cd424a4
Status affected
Version < f4032d615f90970d6c3ac1d9c0bce3351eb4445c
Version 6f99612e250041a2402d3b1694bccb149cd424a4
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.8
Status affected
Version < 4.8
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.322
Status unaffected
Version <= 4.19.*
Version 4.19.291
Status unaffected
Version <= 5.4.*
Version 5.4.251
Status unaffected
Version <= 5.10.*
Version 5.10.188
Status unaffected
Version <= 5.15.*
Version 5.15.121
Status unaffected
Version <= 6.1.*
Version 6.1.40
Status unaffected
Version <= 6.4.*
Version 6.4.5
Status unaffected
Version <= *
Version 6.5
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.099
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.