Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-0459

Опубликовано: 25 мая 2023
Источник: debian
EPSS Низкий

Описание

Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.1.15-1package
linuxfixed5.10.178-1bullseyepackage

Примечания

  • https://github.com/google/security-research/security/advisories/GHSA-m7j5-797w-vmrh

  • https://git.kernel.org/linus/74e19ef0ff8061ef55957c3abd71614ef0f42f47 (6.3-rc1)

EPSS

Процентиль: 1%
0.00011
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 2 лет назад

Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47

CVSS3: 6.7
redhat
почти 6 лет назад

Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47

CVSS3: 6.5
nvd
больше 2 лет назад

Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47

CVSS3: 5.5
msrc
больше 2 лет назад

Copy_from_user Spectre-V1 Gadget in Linux Kernel

CVSS3: 6.5
github
больше 2 лет назад

Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47

EPSS

Процентиль: 1%
0.00011
Низкий