Количество 4
Количество 4
CVE-2023-52824
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2023-52824
[REJECTED CVE] A memory handling vulnerability was identified in the Linux kernel's watch_queue subsystem. The issue stems from the lack of overflow checks when duplicating a user-space array with memdup_user(). This could allow an attacker to exploit the absence of safeguards, potentially leading to a denial-of-service condition.
CVE-2023-52824
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
GHSA-f767-54f7-4qgq
In the Linux kernel, the following vulnerability has been resolved: kernel: watch_queue: copy user-array safely Currently, there is no overflow-check with memdup_user(). Use the new function memdup_array_user() instead of memdup_user() for duplicating the user-space array safely.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-52824 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | больше 1 года назад | |||
CVE-2023-52824 [REJECTED CVE] A memory handling vulnerability was identified in the Linux kernel's watch_queue subsystem. The issue stems from the lack of overflow checks when duplicating a user-space array with memdup_user(). This could allow an attacker to exploit the absence of safeguards, potentially leading to a denial-of-service condition. | больше 1 года назад | |||
CVE-2023-52824 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | больше 1 года назад | |||
GHSA-f767-54f7-4qgq In the Linux kernel, the following vulnerability has been resolved: kernel: watch_queue: copy user-array safely Currently, there is no overflow-check with memdup_user(). Use the new function memdup_array_user() instead of memdup_user() for duplicating the user-space array safely. | больше 1 года назад |
Уязвимостей на страницу