First published: Thu May 25 2023(Updated: )
Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47
Credit: cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <4.14.307 | |
Linux Kernel | >=4.19.0<4.19.274 | |
Linux Kernel | >=5.4.0<5.4.233 | |
Linux Kernel | >=5.10.0<5.10.170 | |
Linux Kernel | >=5.15.0<5.15.96 | |
Linux Kernel | >=6.1.0<6.1.14 | |
Linux Kernel | >=6.2.0<6.2.1 | |
Linux Kernel | <2023-02-21 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0459 has been assigned a high severity due to its potential for sensitive information leakage.
To fix CVE-2023-0459, upgrade your Linux kernel to a version beyond commit 74 or to one of the recommended fixed versions.
CVE-2023-0459 affects 64-bit versions of the Linux kernel prior to 4.14.307, between 4.19.0 and 4.19.274, between 5.4.0 and 5.4.233, between 5.10.0 and 5.10.170, between 5.15.0 and 5.15.96, and between 6.1.0 and 6.1.14.
CVE-2023-0459 enables an attacker to bypass the access checks, potentially leaking sensitive information from the kernel.
CVE-2023-0459 is not limited to a specific Linux distribution as it affects the Linux kernel itself.