An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://lore.kernel.org/lkml/1682238502-1892-1-git-send-email-yangpc%40wangsu.com/T/ | |
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2 | release notes mailing list |
https://www.debian.org/security/2023/dsa-5448 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html | third party advisory mailing list |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43ec16f1450f4936025a9bdf1a273affdb9732c1 | patch |
https://www.debian.org/security/2023/dsa-5480 | third party advisory vendor advisory |
https://security.netapp.com/advisory/ntap-20230824-0006/ | third party advisory |
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html | third party advisory mailing list |