CVE-2023-52824
Published: May 23, 2024Last modified: June 18, 2025
Description
In the Linux kernel, the following vulnerability has been resolved: kernel: watch_queue: copy user-array safely Currently, there is no overflow-check with memdup_user(). Use the new function memdup_array_user() instead of memdup_user() for duplicating the user-space array safely.
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | linux-lts | Fixed (6.1.68-r0) |
| Stream | linux-lts | Fixed (6.1.68-r0) |
References
- https://git.kernel.org/stable/c/0f403ebad98e6151aaa9c96c9aae5549aa4d87cd
- https://git.kernel.org/stable/c/22260dabcfe30ab70440d91aa1e4a703d13925c4
- https://git.kernel.org/stable/c/6995df256e4f5841fb45cf40d04f94b62b8067e1
- https://git.kernel.org/stable/c/c7acf02df1673a4ea7d6401ac4bc773ffe6a88f6
- https://git.kernel.org/stable/c/ca0776571d3163bd03b3e8c9e3da936abfaecbf6