CVE-2023-6238

A buffer overflow vulnerability was found in the NVM Express (NVMe) driver in the Linux kernel. Only privileged user could specify a small meta buffer and let the device perform larger Direct Memory Access (DMA) into the same buffer, overwriting unrelated kernel memory, causing random kernel crashes and memory corruption.
References
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

History

21 Nov 2024, 08:43

Type Values Removed Values Added
References () https://access.redhat.com/security/cve/CVE-2023-6238 - Third Party Advisory () https://access.redhat.com/security/cve/CVE-2023-6238 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2250834 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=2250834 - Issue Tracking, Third Party Advisory

06 Feb 2024, 18:53

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 6.7

06 Feb 2024, 12:15

Type Values Removed Values Added
Summary A buffer overflow vulnerability was found in the NVM Express (NVMe) driver in the Linux kernel. An unprivileged user could specify a small meta buffer and let the device perform larger Direct Memory Access (DMA) into the same buffer, overwriting unrelated kernel memory, causing random kernel crashes and memory corruption. A buffer overflow vulnerability was found in the NVM Express (NVMe) driver in the Linux kernel. Only privileged user could specify a small meta buffer and let the device perform larger Direct Memory Access (DMA) into the same buffer, overwriting unrelated kernel memory, causing random kernel crashes and memory corruption.

29 Nov 2023, 02:31

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
References () https://access.redhat.com/security/cve/CVE-2023-6238 - () https://access.redhat.com/security/cve/CVE-2023-6238 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2250834 - () https://bugzilla.redhat.com/show_bug.cgi?id=2250834 - Issue Tracking, Third Party Advisory
First Time Fedoraproject fedora
Fedoraproject
Linux linux Kernel
Linux
CWE CWE-120

21 Nov 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-21 21:15

Updated : 2024-11-21 08:43


NVD link : CVE-2023-6238

Mitre link : CVE-2023-6238

CVE.ORG link : CVE-2023-6238


JSON object : View

Products Affected

linux

  • linux_kernel

fedoraproject

  • fedora
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')