Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-2008

Опубликовано: 13 апр. 2023
Источник: redhat
CVSS3: 8.2
EPSS Низкий

Описание

A flaw was found in the Linux kernel's udmabuf device driver. The specific flaw exists within a fault handler. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel.

A flaw was found in the Linux kernel's udmabuf device driver, within a fault handler. This issue occurs due to the lack of proper validation of user-supplied data, which can result in memory access past the end of an array. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.

Отчет

Red Hat Enterprise Linux 6, 7, and 8 are not affected by this flaw as they did not include support for the userspace dmabuf misc driver (CONFIG_UDMABUF is not set).

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelFixedRHSA-2022:826715.11.2022
Red Hat Enterprise Linux 9kernel-rtFixedRHSA-2022:793315.11.2022
Red Hat Enterprise Linux 9kernelFixedRHSA-2022:826715.11.2022
Red Hat Enterprise Linux 9.0 Extended Update SupportkernelFixedRHSA-2023:346506.06.2023
Red Hat Enterprise Linux 9.0 Extended Update Supportkernel-rtFixedRHSA-2023:347006.06.2023

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-129
https://bugzilla.redhat.com/show_bug.cgi?id=2186862kernel: udmabuf: improper validation of array index leading to local privilege escalation

EPSS

Процентиль: 77%
0.0105
Низкий

8.2 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 3 года назад

A flaw was found in the Linux kernel's udmabuf device driver. The specific flaw exists within a fault handler. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel.

CVSS3: 7.8
nvd
почти 3 года назад

A flaw was found in the Linux kernel's udmabuf device driver. The specific flaw exists within a fault handler. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel.

CVSS3: 7.8
msrc
почти 3 года назад

Описание отсутствует

CVSS3: 7.8
debian
почти 3 года назад

A flaw was found in the Linux kernel's udmabuf device driver. The spec ...

CVSS3: 7.8
github
почти 3 года назад

A flaw was found in the Linux kernel's udmabuf device driver. The specific flaw exists within a fault handler. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel.

EPSS

Процентиль: 77%
0.0105
Низкий

8.2 High

CVSS3