In the Linux kernel, the following vulnerability has been resolved:
platform/chrome: crosecchardev: fix kernel data leak from ioctl
It is possible to peep kernel page's data by providing larger insize
in struct croseccommand[1] when invoking EC host commands.
Fix it by using zeroed memory.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53059.json",
"cna_assigner": "Linux"
}[
{
"id": "CVE-2023-53059-06b19482",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"303967445079756058460394407405095246498",
"47057960322318813861141063205137955597",
"74613298575056031751986573917479576870",
"48695717154260220275222177301634995041"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b20cf3f89c56b5f6a38b7f76a8128bf9f291bbd3",
"signature_type": "Line",
"target": {
"file": "drivers/platform/chrome/cros_ec_chardev.c"
}
},
{
"id": "CVE-2023-53059-2cbf74b4",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"303967445079756058460394407405095246498",
"47057960322318813861141063205137955597",
"74613298575056031751986573917479576870",
"48695717154260220275222177301634995041"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a0d8644784f73fa39f57f72f374eefaba2bf48a0",
"signature_type": "Line",
"target": {
"file": "drivers/platform/chrome/cros_ec_chardev.c"
}
},
{
"id": "CVE-2023-53059-5dae8213",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"303967445079756058460394407405095246498",
"47057960322318813861141063205137955597",
"74613298575056031751986573917479576870",
"48695717154260220275222177301634995041"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ebea2e16504f40d2c2bac42ad5c5a3de5ce034b4",
"signature_type": "Line",
"target": {
"file": "drivers/platform/chrome/cros_ec_chardev.c"
}
},
{
"id": "CVE-2023-53059-6f4773cf",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"303967445079756058460394407405095246498",
"47057960322318813861141063205137955597",
"74613298575056031751986573917479576870",
"48695717154260220275222177301634995041"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@eab28bfafcd1245a3510df9aa9eb940589956ea6",
"signature_type": "Line",
"target": {
"file": "drivers/platform/chrome/cros_ec_chardev.c"
}
},
{
"id": "CVE-2023-53059-90e1b47b",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"303967445079756058460394407405095246498",
"47057960322318813861141063205137955597",
"74613298575056031751986573917479576870",
"48695717154260220275222177301634995041"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@13493ad6a220cb3f6f3552a16b4f2753a118b633",
"signature_type": "Line",
"target": {
"file": "drivers/platform/chrome/cros_ec_chardev.c"
}
},
{
"id": "CVE-2023-53059-c6012009",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"303967445079756058460394407405095246498",
"47057960322318813861141063205137955597",
"74613298575056031751986573917479576870",
"48695717154260220275222177301634995041"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f86ff88a1548ccf5a13960c0e7625ca787ea0993",
"signature_type": "Line",
"target": {
"file": "drivers/platform/chrome/cros_ec_chardev.c"
}
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53059.json"