{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T08:48:09.277","vulnerabilities":[{"cve":{"id":"CVE-2023-3141","sourceIdentifier":"secalert@redhat.com","published":"2023-06-09T20:15:10.327","lastModified":"2025-03-11T15:15:38.867","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A use-after-free flaw was found in r592_remove in drivers\/memstick\/host\/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:N\/A:H","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.2},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:N\/A:H","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.2}]},"weaknesses":[{"source":"secalert@redhat.com","type":"Secondary","description":[{"lang":"en","value":"CWE-416"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-416"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.39","versionEndExcluding":"4.14.316","matchCriteriaId":"A0100C89-0C53-496C-8024-4D3E991DCAF1"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.15","versionEndExcluding":"4.19.284","matchCriteriaId":"9112EE64-11F4-46DB-A041-95118F20F81B"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","versionEndExcluding":"5.4.244","matchCriteriaId":"79F47095-8BA3-495A-AED3-2CCA5F2838E6"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.10.181","matchCriteriaId":"F5B1726B-45AA-47F2-9261-6DC963E92248"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.11","versionEndExcluding":"5.15.113","matchCriteriaId":"F3D5E1B5-AB9D-4ECC-8F11-F3E1BF761E27"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16","versionEndExcluding":"6.1.30","matchCriteriaId":"E9430E62-03EA-42E6-9E5E-BD1D5124D107"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2","versionEndExcluding":"6.3.4","matchCriteriaId":"26C54BF0-3EED-46D4-92A7-5F07F658B49B"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:hci_baseboard_management_controller:h300s:*:*:*:*:*:*:*","matchCriteriaId":"27227B35-932A-4035-B39F-6A455753C0D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:hci_baseboard_management_controller:h410c:*:*:*:*:*:*:*","matchCriteriaId":"489D20B9-166F-423D-8C48-A23D3026E33B"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:hci_baseboard_management_controller:h410s:*:*:*:*:*:*:*","matchCriteriaId":"A4AD592C-222D-4C6F-B176-8145A1A5AFEC"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:hci_baseboard_management_controller:h500s:*:*:*:*:*:*:*","matchCriteriaId":"8603654B-A8A9-4DEB-B0DD-C82E1C885749"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:hci_baseboard_management_controller:h700s:*:*:*:*:*:*:*","matchCriteriaId":"C855C933-F271-45E6-8E85-8D7CF2EF1BE6"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","matchCriteriaId":"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"}]}]}],"references":[{"url":"https:\/\/cdn.kernel.org\/pub\/linux\/kernel\/v6.x\/ChangeLog-6.3.4","source":"secalert@redhat.com","tags":["Third Party Advisory"]},{"url":"https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?id=63264422785021704c39b38f65a78ab9e4a186d7","source":"secalert@redhat.com","tags":["Mailing List","Vendor Advisory"]},{"url":"https:\/\/lists.debian.org\/debian-lts-announce\/2023\/07\/msg00030.html","source":"secalert@redhat.com","tags":["Mailing List","Third Party Advisory","VDB Entry"]},{"url":"https:\/\/lists.debian.org\/debian-lts-announce\/2023\/10\/msg00027.html","source":"secalert@redhat.com","tags":["Mailing List","Third Party Advisory"]},{"url":"https:\/\/lore.kernel.org\/lkml\/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw%40mail.gmail.com\/t\/","source":"secalert@redhat.com"},{"url":"https:\/\/security.netapp.com\/advisory\/ntap-20230706-0004\/","source":"secalert@redhat.com","tags":["Third Party Advisory"]},{"url":"https:\/\/cdn.kernel.org\/pub\/linux\/kernel\/v6.x\/ChangeLog-6.3.4","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?id=63264422785021704c39b38f65a78ab9e4a186d7","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Vendor Advisory"]},{"url":"https:\/\/lists.debian.org\/debian-lts-announce\/2023\/07\/msg00030.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory","VDB Entry"]},{"url":"https:\/\/lists.debian.org\/debian-lts-announce\/2023\/10\/msg00027.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https:\/\/lore.kernel.org\/lkml\/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw%40mail.gmail.com\/t\/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/security.netapp.com\/advisory\/ntap-20230706-0004\/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}