First published: Fri Apr 14 2023(Updated: )
A flaw was found in the Linux kernel's udmabuf device driver. The specific flaw exists within a fault handler. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <5.19 | 5.19 |
Linux Linux kernel | <5.19 | |
Linux Linux kernel | >=4.20<5.4.202 | |
Linux Linux kernel | >=5.5<5.10.127 | |
Linux Linux kernel | >=5.11<5.15.51 | |
Linux Linux kernel | >=5.16<5.18.8 | |
Linux Linux kernel | =5.19 | |
Linux Linux kernel | =5.19-rc1 | |
Linux Linux kernel | =5.19-rc2 | |
Linux Linux kernel | =5.19-rc3 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2023-2008.
CVE-2023-2008 has a severity rating of 8.2 (high).
Linux Kernel versions up to and including 5.19 are affected by CVE-2023-2008.
An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit CVE-2023-2008.
You can find more information about CVE-2023-2008 on the following references: [Reference 1](https://github.com/torvalds/linux/commit/05b252cccb2e5c3f56119d25de684b4f810ba4), [Reference 2](https://www.zerodayinitiative.com/advisories/ZDI-23-441/), [Reference 3](https://access.redhat.com/errata/RHSA-2022:8267).