First published: Thu May 25 2023(Updated: )
Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47
Credit: cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <2023-02-21 | |
Linux Linux kernel | <4.14.307 | |
Linux Linux kernel | >=4.19.0<4.19.274 | |
Linux Linux kernel | >=5.4.0<5.4.233 | |
Linux Linux kernel | >=5.10.0<5.10.170 | |
Linux Linux kernel | >=5.15.0<5.15.96 | |
Linux Linux kernel | >=6.1.0<6.1.14 | |
Linux Linux kernel | >=6.2.0<6.2.1 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.12.6-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.