First published: Wed Apr 26 2023(Updated: )
A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 or commit 739790605705ddcf18f21782b9c99ad7d53a8c11
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.2 | 6.2 |
Linux Kernel | <6.1.8 | |
Linux Kernel | =6.2-rc1 | |
Linux Kernel | =6.2-rc2 | |
Linux Kernel | =6.2-rc3 | |
Linux Kernel | =6.2-rc4 | |
Debian GNU/Linux | =10.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager | <=ISVG 10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0458 is considered to have a high severity due to the potential for information leakage.
To fix CVE-2023-0458, upgrade to the Linux kernel version 6.2 or higher.
CVE-2023-0458 affects the Linux Kernel versions prior to 6.1.8 and specific versions of IBM Security Verify Governance and Identity Manager.
CVE-2023-0458 is a speculative pointer dereference issue that can be exploited to leak sensitive data.
CVE-2023-0458 can potentially be exploited locally, making it a concern for systems that allow untrusted user access.