{"id":"CVE-2023-2008","details":"A flaw was found in the Linux kernel's udmabuf device driver. The specific flaw exists within a fault handler. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel.","modified":"2026-03-15T22:46:24.174177Z","published":"2023-04-14T21:15:08.597Z","related":["SUSE-SU-2023:2140-1","SUSE-SU-2023:2141-1","SUSE-SU-2023:2146-1","SUSE-SU-2023:2147-1","SUSE-SU-2023:2148-1","SUSE-SU-2023:2231-1"],"references":[{"type":"ADVISORY","url":"https://www.zerodayinitiative.com/advisories/ZDI-23-441/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230517-0007/"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2186862"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/05b252cccb2e5c3f56119d25de684b4f810ba4"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-2008.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"5.19"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.202"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.127"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.15.51"}]},{"events":[{"introduced":"5.16"},{"fixed":"5.18.8"}]},{"events":[{"introduced":"0"},{"last_affected":"5.19-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"5.19-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.19-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.19-rc3"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}