First published: Mon Mar 27 2023(Updated: )
A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=4.17<4.19.273 | |
Linux Kernel | >=4.20<5.4.232 | |
Linux Kernel | >=5.5<5.10.168 | |
Linux Kernel | >=5.11<5.15.94 | |
Linux Kernel | >=5.16<6.1.12 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.133-1 6.12.21-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1078 is considered a high severity vulnerability due to its potential for local exploitation.
To fix CVE-2023-1078, upgrade your Linux Kernel to a version that is patched, such as 5.10.223-1 or later.
CVE-2023-1078 affects local users running vulnerable versions of the Linux Kernel that utilize the RDS protocol.
CVE-2023-1078 involves a flaw in the RDS (Reliable Datagram Sockets) protocol within the Linux Kernel.
Exploitation of CVE-2023-1078 could lead to type confusion vulnerabilities affecting memory management and data integrity.