{"id":"CVE-2023-1078","details":"A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.","modified":"2026-04-16T00:00:36.107144087Z","published":"2023-03-27T21:15:10.520Z","related":["SUSE-SU-2023:1574-1","SUSE-SU-2023:1576-1","SUSE-SU-2023:1591-1","SUSE-SU-2023:1592-1","SUSE-SU-2023:1595-1","SUSE-SU-2023:1605-1","SUSE-SU-2023:1608-1","SUSE-SU-2023:1609-1","SUSE-SU-2023:1610-1","SUSE-SU-2023:1621-1","SUSE-SU-2023:1639-1","SUSE-SU-2023:1645-1","SUSE-SU-2023:1647-1","SUSE-SU-2023:1649-1","SUSE-SU-2023:1651-1","SUSE-SU-2023:1708-1","SUSE-SU-2023:1710-1","SUSE-SU-2023:1800-1","SUSE-SU-2023:1811-1","SUSE-SU-2023:1892-1","SUSE-SU-2023:2809-1","openSUSE-SU-2024:12814-1","openSUSE-SU-2024:13704-1"],"references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2023/11/05/1"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230505-0004/"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=f753a68980cf4b59a80fe677619da2b1804f526d"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-1078.json","unresolved_ranges":[{"events":[{"introduced":"4.17"},{"fixed":"4.19.273"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.232"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.168"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.15.94"}]},{"events":[{"introduced":"5.16"},{"fixed":"6.1.12"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}