A buffer overflow vulnerability was found in the NVM Express (NVMe) driver in the Linux kernel. Only privileged user could specify a small meta buffer and let the device perform larger Direct Memory Access (DMA) into the same buffer, overwriting unrelated kernel memory, causing random kernel crashes and memory corruption.
Workaround:
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://access.redhat.com/security/cve/CVE-2023-6238 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2250834 | third party advisory issue tracking |