Back to bug 2216383
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Rohit Keshri | 2023-06-21 04:57:55 UTC | Summary | kernel: Copy_from_user on 64-bit versions may leak kernel information | CVE-2023-0459 kernel: Copy_from_user on 64-bit versions may leak kernel information |
| Alias | CVE-2023-0459 | |||
| Rohit Keshri | 2023-06-21 05:02:22 UTC | Doc Text | A vulnerability was found in copy_from_user on 64-bit versions of the Linux Kernel. This flaw would allow a local attacker to leak information due to a misses sanity check to bypass the "access_ok", and pass a kernel pointer to copy_from_user(). | |
| Rohit Keshri | 2023-06-21 05:12:17 UTC | CC | acaringi, allarkin, bhu, chwhite, dbohanno, ddepaula, debarbos, dvlasenk, ezulian, hkrzesin, jarod, jdenham, jfaracco, jferlan, jforbes, jlelli, joe.lawrence, jshortt, jstancek, jwyatt, kcarcia, kernel-mgr, ldoskova, lgoncalv, lleshchi, lzampier, nmurray, ptalbert, qzhao, rrobaina, rvrbovsk, rysulliv, scweaver, swood, tyberry, walters, wcosta, williams, wmealing, ycote, ymankad | |
| Rohit Keshri | 2023-06-21 05:13:53 UTC | CC | dfreiber, jburrell, rogbas, vkumar | |
| Mauro Matteo Cascella | 2023-06-21 10:48:07 UTC | Doc Text | A vulnerability was found in copy_from_user on 64-bit versions of the Linux Kernel. This flaw would allow a local attacker to leak information due to a misses sanity check to bypass the "access_ok", and pass a kernel pointer to copy_from_user(). | A vulnerability was found in copy_from_user on 64-bit versions of the Linux Kernel. This flaw would allow a local attacker to bypass the "access_ok" sanity check and pass a kernel pointer to copy_from_user(), ultimately leaking kernel data. |
| RaTasha Tillery-Smith | 2023-06-21 14:05:18 UTC | Doc Text | A vulnerability was found in copy_from_user on 64-bit versions of the Linux Kernel. This flaw would allow a local attacker to bypass the "access_ok" sanity check and pass a kernel pointer to copy_from_user(), ultimately leaking kernel data. | A vulnerability was found in copy_from_user in 64-bit versions of the Linux kernel. This flaw allows a local attacker to bypass the "access_ok" sanity check and pass a kernel pointer to copy_from_user(), resulting in kernel data leaking. |
| Red Hat Bugzilla | 2023-07-07 08:35:08 UTC | Assignee | security-response-team | nobody |
Back to bug 2216383