{"id":"CVE-2023-45863","details":"An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.","modified":"2026-03-14T15:02:22.387244Z","published":"2023-10-14T21:15:45.233Z","related":["ALSA-2024:2394","SUSE-SU-2023:4730-1","SUSE-SU-2023:4731-1","SUSE-SU-2023:4732-1","SUSE-SU-2023:4733-1","SUSE-SU-2023:4734-1","SUSE-SU-2023:4735-1","SUSE-SU-2023:4782-1","SUSE-SU-2023:4783-1","SUSE-SU-2023:4784-1","SUSE-SU-2023:4810-1","SUSE-SU-2023:4811-1","SUSE-SU-2023:4882-1","SUSE-SU-2023:4883-1","SUSE-SU-2024:0112-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html"},{"type":"ADVISORY","url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.3"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3bb2a01caa813d3a1845d378bbe4169ef280d394"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-45863.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"6.2.3"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}