This was assigned as a duplicate of CVE-2023-4244.
Author | Note |
---|---|
Priority reason: By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | upstream | noarch | linux-hwe | < 6.5~rc7 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-hwe | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-hwe-5.4 | < any | UNKNOWN |
ubuntu | upstream | noarch | linux-hwe-5.4 | < 6.5~rc7 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-hwe-5.15 | < any | UNKNOWN |
ubuntu | upstream | noarch | linux-hwe-5.15 | < 6.5~rc7 | UNKNOWN |
ubuntu | upstream | noarch | linux-hwe-5.19 | < 6.5~rc7 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-hwe-5.19 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-hwe-6.2 | < any | UNKNOWN |
ubuntu | upstream | noarch | linux-hwe-6.2 | < 6.5~rc7 | UNKNOWN |
access.redhat.com/security/cve/CVE-2023-4563
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4563
launchpad.net/bugs/cve/CVE-2023-4563
lore.kernel.org/netdev/[email protected]/
lore.kernel.org/netdev/[email protected]/
nvd.nist.gov/vuln/detail/CVE-2023-4563
security-tracker.debian.org/tracker/CVE-2023-4563