First published: Wed Dec 06 2023(Updated: )
A flaw in the Linux Kernel found. For the io_uring SQ/CQ rings, out of boundaries memory access could happen as result of incorrect behavior in function __io_uaddr_map for the case of not physically contiguous memory. Reference: <a href="https://patchwork.kernel.org/project/io-uring/patch/20231130194633.649319-2-axboe@kernel.dk/">https://patchwork.kernel.org/project/io-uring/patch/20231130194633.649319-2-axboe@kernel.dk/</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=6.6 | |
Linux Linux kernel | =6.7-rc1 | |
Linux Linux kernel | =6.7-rc2 | |
Linux Linux kernel | =6.7-rc3 | |
Linux Linux kernel | =6.7-rc4 | |
redhat/kernel | <6.7 | 6.7 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.6-1 6.12.9-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6560 is a vulnerability in the Linux kernel's io_uring SQ/CQ rings functionality, which allows a local user to trigger an out-of-bounds memory access.
CVE-2023-6560 has a severity rating of medium with a CVSS score of 5.5.
A local user can exploit CVE-2023-6560 by triggering an out-of-bounds memory access in the io_uring SQ/CQ rings functionality.
Versions up to exclusive 6.7 of the Red Hat kernel are affected by CVE-2023-6560.
Yes, a fix for CVE-2023-6560 is available. Please refer to the references for more information.