Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published: 2023-05-25T13:22:38.338Z

Updated: 2024-08-02T05:10:56.155Z

Reserved: 2023-01-24T09:43:39.956Z

Link: CVE-2023-0459

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2023-05-25T14:15:09.603

Modified: 2023-06-06T13:47:53.550

Link: CVE-2023-0459

cve-icon Redhat

Severity : Low

Publid Date: 2020-02-15T06:30:00Z

Links: CVE-2023-0459 - Bugzilla