CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
17.7%
A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on
32-bit systems, there might be some uninitialized portions of the
kvm_debugregs structure that could be copied to userspace, causing an
information leak.
Author | Note |
---|---|
cascardo | restricted info leak, only available to kvm group |
sbeattie | WRT the break commit, there are two ways to look at this CVE: to consider it covering that the commit 97e69aa62f8b “KVM: x86: fix information leak to userland” (v2.6.37-rc2) incompletely fixed the information disclosure, or that it covers the information disclosure in its entirety. We have chosen to interpret it as the former here, as more than debugregs leaks were attempted to be covered by commit 97e69aa62f8b. This is despite the fact that it does not appear that a CVE was issued for the original kernel memory disclosure issue. If the interpretation is the latter, then the break commit would be a1efbe77c1fd “KVM: x86: Add support for saving&restoring debug registers” (v2.6.35-rc1). |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < 4.15.0-211.222 | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < 5.4.0-149.166 | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < 5.15.0-72.79 | UNKNOWN |
ubuntu | 22.10 | noarch | linux | < 5.19.0-42.43 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < 4.15.0-1156.169 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1102.110 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1036.40 | UNKNOWN |
ubuntu | 22.10 | noarch | linux-aws | < 5.19.0-1025.26 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < 5.15.0-1036.40~20.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < 5.4.0-1103.111~18.04.1 | UNKNOWN |
git.kernel.org/linus/2c10b61421a28e95a46ab489fd56c0f442ff6952 (6.2)
launchpad.net/bugs/cve/CVE-2023-1513
nvd.nist.gov/vuln/detail/CVE-2023-1513
security-tracker.debian.org/tracker/CVE-2023-1513
ubuntu.com/security/notices/USN-6079-1
ubuntu.com/security/notices/USN-6080-1
ubuntu.com/security/notices/USN-6081-1
ubuntu.com/security/notices/USN-6084-1
ubuntu.com/security/notices/USN-6085-1
ubuntu.com/security/notices/USN-6090-1
ubuntu.com/security/notices/USN-6091-1
ubuntu.com/security/notices/USN-6092-1
ubuntu.com/security/notices/USN-6094-1
ubuntu.com/security/notices/USN-6095-1
ubuntu.com/security/notices/USN-6096-1
ubuntu.com/security/notices/USN-6109-1
ubuntu.com/security/notices/USN-6118-1
ubuntu.com/security/notices/USN-6132-1
ubuntu.com/security/notices/USN-6133-1
ubuntu.com/security/notices/USN-6134-1
ubuntu.com/security/notices/USN-6222-1
ubuntu.com/security/notices/USN-6256-1
www.cve.org/CVERecord?id=CVE-2023-1513