Description
An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.
References (8)
Core 8
Core References
Third Party Advisory vendor-advisory
https://www.debian.org/security/2023/dsa-5448
Mailing List, Release Notes
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2
Third Party Advisory
https://security.netapp.com/advisory/ntap-20230824-0006/
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
Third Party Advisory vendor-advisory
https://www.debian.org/security/2023/dsa-5480
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
Scores
CVSS v3
7.1
EPSS
0.0001
EPSS Percentile
0.7%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-125
Status
published
Products (4)
debian/debian_linux
10.0
debian/debian_linux
11.0
debian/debian_linux
12.0
linux/linux_kernel
< 6.4
Published
Jun 16, 2023
Tracked Since
Feb 18, 2026