Closed mend-bolt-for-github[bot] closed 6 months ago
Julia Cartwright's fork of linux-stable-rt.git
Library home page: https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git
Found in HEAD commit: f1f3d2b150be669390b32dfea28e773471bdd6e7
Found in base branch: master
/kernel/relay.c /kernel/relay.c
An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.
Publish Date: 2023-06-16
URL: CVE-2023-3268
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: High
Type: Upgrade version
Origin: https://www.linuxkernelcves.com/cves/CVE-2023-3268
Release Date: 2023-06-16
Fix Resolution: v4.19.283,v5.4.243,v5.10.180,v5.15.111,v6.1.28,v6.2.15
Step up your Open Source Security Game with Mend here
CVE-2023-3268 - High Severity Vulnerability
Vulnerable Library - linux-stable-rtv4.1.33
Julia Cartwright's fork of linux-stable-rt.git
Library home page: https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git
Found in HEAD commit: f1f3d2b150be669390b32dfea28e773471bdd6e7
Found in base branch: master
Vulnerable Source Files (2)
/kernel/relay.c /kernel/relay.c
Vulnerability Details
An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.
Publish Date: 2023-06-16
URL: CVE-2023-3268
CVSS 3 Score Details (7.1)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://www.linuxkernelcves.com/cves/CVE-2023-3268
Release Date: 2023-06-16
Fix Resolution: v4.19.283,v5.4.243,v5.10.180,v5.15.111,v6.1.28,v6.2.15
Step up your Open Source Security Game with Mend here