ID: CVE-2023-0458

Last Modified: May 9, 2023

A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 or commit 739790605705ddcf18f21782b9c99ad7d53a8c11

Twitter Activity

Tweets last week: 0

Remaining steady

Yahoo Activity

Yahoo results: 0

Remaining steady

EPSS History

Current EPSS Score: 0.00045

Remaining steady


Reddit Activity

Reddit Posts: 0

Remaining steady

Github Repos

Github Repos: 0

Remaining steady

Exploits

Found exploits:

Attack Vector: Local

Attack Complexity: High

Privileges Required: Low

User Interaction: None

Scope: Unchanged

Confidentiality: High

Integrity: None

Availability: None

Base Score: 4.7

Exploitability Score: 1.0

Impact Score: 3.6

CVSS V3: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

Specialize CVSS-Score

CWE-476

Condition Configuration
OR
OR
Alle Schwachstellen für linux
Alle Schwachstellen für linux
Alle Schwachstellen für linux
Alle Schwachstellen für linux
Alle Schwachstellen für linux
Condition Configuration
OR
OR
Alle Schwachstellen für debian
Date: May 3, 2023

Reference:
added:
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html



Date: May 3, 2023

Reference:
added:
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html



Date: May 9, 2023

CWE-ID: Not defined
Base Score V3: Not defined
Exploitability Score V3: Not defined
Impact Score V3: Not defined
Cvss Vector V3: Not defined
Configuration:
added:
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*



                    <?xml version="1.0" ?>
<set operator="and">
    <set operator="or">
        <set operator="or">
            <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*"/>
            <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*"/>
            <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*"/>
            <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*"/>
            <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"/>
        </set>
        <set operator="or">
            <prop key="operating_system" value="cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"/>
        </set>
    </set>
</set>

                  
                      <?xml version="1.0" ?>
<set operator="and">
    <set operator="or">
        <set operator="or">
            <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*"/>
            <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*"/>
            <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*"/>
            <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*"/>
            <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"/>
        </set>
        <set operator="or">
            <prop key="operating_system" value="cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"/>
        </set>
    </set>
    <prop key="program_influence" value="input"/>
</set>