A flaw was found in the Linux kernel's udmabuf device driver. The specific flaw exists within a fault handler. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2186862 | Issue Tracking Patch Third Party Advisory |
https://github.com/torvalds/linux/commit/05b252cccb2e5c3f56119d25de684b4f810ba4 | Patch |
https://security.netapp.com/advisory/ntap-20230517-0007/ | Third Party Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-23-441/ | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-04-14 21:15
Updated : 2023-07-06 16:43
NVD link : CVE-2023-2008
Mitre link : CVE-2023-2008
CVE.ORG link : CVE-2023-2008
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-129
Improper Validation of Array Index