A memory leak flaw was found in the Linux kernel’s DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.
Link | Tags |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13 | mailing list exploit third party advisory |
https://www.debian.org/security/2022/dsa-5161 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html | third party advisory mailing list |
https://www.debian.org/security/2022/dsa-5173 | third party advisory vendor advisory |