Skip to main content

CVE-2023-1078: CWE-787 in Linux kernel

High
VulnerabilityCVE-2023-1078cvecve-2023-1078cwe-787
Published: Mon Mar 27 2023 (03/27/2023, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: Linux kernel

Description

A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.

AI-Powered Analysis

AILast updated: 07/03/2025, 12:13:09 UTC

Technical Analysis

CVE-2023-1078 is a high-severity vulnerability in the Linux kernel affecting the Reliable Datagram Sockets (RDS) protocol implementation. The flaw arises from improper handling in the rds_rm_zerocopy_callback() function, which uses the list_entry() macro on the head of a list without proper validation, leading to a type confusion condition. Specifically, a local user can invoke rds_message_put() to trigger this vulnerability. The type confusion causes the pointer to struct rds_msg_zcopy_info to reference memory that may be controlled or influenced by the attacker. This results in an out-of-bounds memory access and subsequent lock corruption within the kernel. The vulnerability is local privilege escalation in nature, requiring local access with low privileges (PR:L) and no user interaction (UI:N). The CVSS 3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploitation could allow an attacker to execute arbitrary code in kernel context, escalate privileges, or cause denial of service by corrupting kernel locks. Although no known exploits are currently reported in the wild, the vulnerability is well understood and can be triggered reliably by local users. The affected Linux kernel versions are unspecified but presumably include versions with the vulnerable RDS code. The vulnerability is classified under CWE-787 (Out-of-bounds Write), indicating memory corruption due to improper bounds checking. This flaw is significant because the Linux kernel is widely deployed across servers, desktops, and embedded systems, and RDS is used in high-performance computing and clustered environments. Attackers with local access could leverage this vulnerability to gain root privileges or disrupt system stability.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for enterprises and research institutions running Linux servers or clusters that utilize the RDS protocol for high-speed communication. Successful exploitation could lead to full system compromise, allowing attackers to access sensitive data, disrupt critical services, or pivot within internal networks. Given the high confidentiality, integrity, and availability impact, organizations handling sensitive personal data (e.g., financial, healthcare, governmental) could face severe regulatory and operational consequences. The vulnerability also threatens cloud service providers and data centers in Europe that rely on Linux-based infrastructure, potentially affecting multi-tenant environments. The local access requirement limits remote exploitation but does not eliminate risk, as attackers could gain initial footholds through other means (e.g., phishing, insider threats) and then escalate privileges via this flaw. Lock corruption could also cause system instability or crashes, impacting availability of critical services. Overall, the vulnerability could facilitate advanced persistent threats (APTs) targeting European organizations, especially those with high-value assets or strategic importance.

Mitigation Recommendations

European organizations should prioritize patching affected Linux kernel versions as soon as vendor updates become available, even though specific patch links are not provided in the current information. In the interim, organizations should audit and restrict local user access, enforcing the principle of least privilege to minimize exposure. Disabling or restricting the use of the RDS protocol where not required can reduce the attack surface. Employing kernel security modules such as SELinux or AppArmor with strict policies can help contain potential exploitation. Monitoring system logs for unusual kernel errors or lock corruption symptoms may provide early detection of exploitation attempts. Regularly updating and hardening Linux systems, combined with network segmentation to limit lateral movement from compromised hosts, will further mitigate risk. Organizations should also conduct internal vulnerability assessments and penetration tests to identify potential local privilege escalation vectors. Finally, maintaining robust incident response plans that include kernel-level compromise scenarios is essential for rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2023-02-27T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc476

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/3/2025, 12:13:09 PM

Last updated: 7/31/2025, 7:02:47 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats