Bugzilla – Bug 1225042
VUL-0: REJECTED: CVE-2023-52824: kernel: kernel: watch_queue: copy user-array safely
Last modified: 2024-05-24 15:45:15 UTC
In the Linux kernel, the following vulnerability has been resolved: kernel: watch_queue: copy user-array safely Currently, there is no overflow-check with memdup_user(). Use the new function memdup_array_user() instead of memdup_user() for duplicating the user-space array safely. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-52824 https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2023/CVE-2023-52824.mbox https://git.kernel.org/stable/c/22260dabcfe30ab70440d91aa1e4a703d13925c4 https://git.kernel.org/stable/c/6995df256e4f5841fb45cf40d04f94b62b8067e1 https://git.kernel.org/stable/c/c7acf02df1673a4ea7d6401ac4bc773ffe6a88f6 https://git.kernel.org/stable/c/0f403ebad98e6151aaa9c96c9aae5549aa4d87cd https://git.kernel.org/stable/c/ca0776571d3163bd03b3e8c9e3da936abfaecbf6 https://www.cve.org/CVERecord?id=CVE-2023-52824
This is not a security bug but rather a security fortification. It depends on ca0776571d31. I think we can leave it out as WONTFIX.
Besides that as pointed by Jiri Bohac, this is not really necessary as the range check is done properly here.
CVE is rejected: https://lore.kernel.org/linux-cve-announce/2024052415-REJECTED-6782@gregkh/