First published: Sun Feb 26 2023(Updated: )
A flaw in the Linux Kernel found. The tls_is_tx_ready() incorrectly checks for list emptiness, potentially accessing a type confused entry to the list_head, leaking the last byte of the confused field that overlaps with rec->tx_ready. Reference: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=ffe2a22562444720b05bdfeb999c03e810d84cbb">https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=ffe2a22562444720b05bdfeb999c03e810d84cbb</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.1.11 | 6.1.11 |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager | <=ISVG 10.0.2 | |
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 |
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1075 is classified as a high-severity vulnerability affecting the Linux Kernel.
To fix CVE-2023-1075, update the Linux Kernel package to version 6.1.11 or later for Red Hat, or to 5.10.223-1 or later for Debian.
CVE-2023-1075 affects all Linux Kernel versions before 6.1.11 for Red Hat, and versions prior to 5.10.223-1 for Debian.
CVE-2023-1075 affects the Linux Kernel as well as IBM Security Verify Governance, Identity Manager software and virtual appliance components.
Exploitation of CVE-2023-1075 could lead to information leakage due to incorrect list handling in the Linux Kernel.