An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.
References
Link | Resource |
---|---|
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2 | Mailing List Release Notes |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43ec16f1450f4936025a9bdf1a273affdb9732c1 | Patch |
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html | Mailing List Third Party Advisory |
https://lore.kernel.org/lkml/1682238502-1892-1-git-send-email-yangpc%40wangsu.com/T/ | |
https://security.netapp.com/advisory/ntap-20230824-0006/ | Third Party Advisory |
https://www.debian.org/security/2023/dsa-5448 | Third Party Advisory |
https://www.debian.org/security/2023/dsa-5480 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-06-16 19:15
Updated : 2023-11-07 04:18
NVD link : CVE-2023-3268
Mitre link : CVE-2023-3268
CVE.ORG link : CVE-2023-3268
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read