Description
A buffer overflow vulnerability was found in the NVM Express (NVMe) driver in the Linux kernel. Only privileged user could specify a small meta buffer and let the device perform larger Direct Memory Access (DMA) into the same buffer, overwriting unrelated kernel memory, causing random kernel crashes and memory corruption.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.8 | Impact: 5.9Attack Vector: Local
Complexity: Low
Privileges: High
User Interaction: None
Scope: Unchanged
Confidentiality: High
Integrity: High
Availability: High
Affected Packages0 packages
Also affects: Fedora 38
🔴Vulnerability Details
4Kernelnvme-pci: use sgls for all user requests if possible↗2024-11-08 ▶ GHSAGHSA-2j83-334m-g9w4: A buffer overflow vulnerability was found in the NVM Express (NVMe) driver in the Linux kernel↗2023-11-21 ▶ OSVCVE-2023-6238: A buffer overflow vulnerability was found in the NVM Express (NVMe) driver in the Linux kernel↗2023-11-21 ▶ CVEListKernel: nvme: memory corruption via unprivileged user passthrough↗2023-11-21 ▶ 📋Vendor Advisories
2Red Hatkernel: nvme: memory corruption via unprivileged user passthrough↗2023-10-13 ▶ DebianCVE-2023-6238: linux - A buffer overflow vulnerability was found in the NVM Express (NVMe) driver in th...↗2023 ▶ 💬Community
1BugzillaCVE-2023-6238 kernel: nvme: memory corruption via unprivileged user passthrough↗2023-11-21 ▶