First published: Mon Mar 20 2023(Updated: )
A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.2 | 6.2 |
Linux kernel | <6.2 | |
Fedora | =37 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
Linux Kernel | <6.2 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 | |
<6.2 | ||
=37 | ||
=7.0 | ||
=8.0 | ||
=9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1513 has been rated with a moderate severity due to its potential information leak risk.
CVE-2023-1513 can lead to exposure of uninitialized memory, which may leak sensitive information from the kernel to user space.
CVE-2023-1513 impacts multiple versions of the Linux Kernel, as well as specific versions of Red Hat Enterprise Linux and Fedora.
To remediate CVE-2023-1513, upgrade to Linux Kernel version 6.2 or apply the latest patches provided by your distribution.
Yes, CVE-2023-1513 primarily affects 32-bit systems when using the KVM_GET_DEBUGREGS ioctl, leading to uninitialized data leaks.