Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: Google
Published: 2023-05-25T13:22:38.338Z
Updated: 2024-08-02T05:10:56.155Z
Reserved: 2023-01-24T09:43:39.956Z
Link: CVE-2023-0459
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2023-05-25T14:15:09.603
Modified: 2023-06-06T13:47:53.550
Link: CVE-2023-0459
Redhat