Описание
In the Linux kernel, the following vulnerability has been resolved:
kernel: kexec: copy user-array safely
Currently, there is no overflow-check with memdup_user().
Use the new function memdup_array_user() instead of memdup_user() for duplicating the user-space array safely.
In the Linux kernel, the following vulnerability has been resolved:
kernel: kexec: copy user-array safely
Currently, there is no overflow-check with memdup_user().
Use the new function memdup_array_user() instead of memdup_user() for duplicating the user-space array safely.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2023-52823
- https://git.kernel.org/stable/c/4fc857cc5cb9b7ce6940898857d773564973a584
- https://git.kernel.org/stable/c/569c8d82f95eb5993c84fb61a649a9c4ddd208b3
- https://git.kernel.org/stable/c/8332523b13dbfcce60f631dfb34ac90df021b4bd
- https://git.kernel.org/stable/c/b0ed017a2b9735753eb95798d9f60176480424ca
- https://git.kernel.org/stable/c/d4f2c09d4672f0e997ba4b1b589cc376be7ec938
CVE ID
Связанные уязвимости
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
[REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved: kernel: kexec: copy user-array safely The Linux kernel CVE team has assigned CVE-2023-52823 to this issue.
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.