CVE Vulnerabilities

CVE-2023-0459

Release of Invalid Pointer or Reference

Published: May 25, 2023 | Modified: Jun 06, 2023
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the access_ok check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47

Weakness

The product attempts to return a memory resource to the system, but it calls the wrong release function or calls the appropriate release function incorrectly.

Affected Software

Name Vendor Start Version End Version
Linux_kernel Linux * 4.14.307 (excluding)
Linux_kernel Linux 4.19.0 (including) 4.19.274 (excluding)
Linux_kernel Linux 5.4.0 (including) 5.4.233 (excluding)
Linux_kernel Linux 5.10.0 (including) 5.10.170 (excluding)
Linux_kernel Linux 5.15.0 (including) 5.15.96 (excluding)
Linux_kernel Linux 6.1.0 (including) 6.1.14 (excluding)
Linux_kernel Linux 6.2.0 (including) 6.2.1 (excluding)

Extended Description

This weakness can take several forms, such as:

Potential Mitigations

  • Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, glibc in Linux provides protection against free of invalid pointers.

References