CVE-2023-52494

In the Linux kernel, the following vulnerability has been resolved: bus: mhi: host: Add alignment check for event ring read pointer Though we do check the event ring read pointer by "is_valid_ring_ptr" to make sure it is in the buffer range, but there is another risk the pointer may be not aligned. Since we are expecting event ring elements are 128 bits(struct mhi_ring_element) aligned, an unaligned read pointer could lead to multiple issues like DoS or ring buffer memory corruption. So add a alignment check for event ring read pointer.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Feb 2025, 16:41

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/2df39ac8f813860f79782807c3f7acff40b3c551 - () https://git.kernel.org/stable/c/2df39ac8f813860f79782807c3f7acff40b3c551 - Mailing List, Patch
References () https://git.kernel.org/stable/c/94991728c84f8df54fd9eec9b85855ef9057ea08 - () https://git.kernel.org/stable/c/94991728c84f8df54fd9eec9b85855ef9057ea08 - Mailing List, Patch
References () https://git.kernel.org/stable/c/a9ebfc405fe1be145f414eafadcbf09506082010 - () https://git.kernel.org/stable/c/a9ebfc405fe1be145f414eafadcbf09506082010 - Mailing List, Patch
References () https://git.kernel.org/stable/c/ecf8320111822a1ae5d5fc512953eab46d543d0b - () https://git.kernel.org/stable/c/ecf8320111822a1ae5d5fc512953eab46d543d0b - Mailing List, Patch
References () https://git.kernel.org/stable/c/eff9704f5332a13b08fbdbe0f84059c9e7051d5f - () https://git.kernel.org/stable/c/eff9704f5332a13b08fbdbe0f84059c9e7051d5f - Mailing List, Patch
CWE CWE-787
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

21 Nov 2024, 08:39

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/2df39ac8f813860f79782807c3f7acff40b3c551 - () https://git.kernel.org/stable/c/2df39ac8f813860f79782807c3f7acff40b3c551 -
References () https://git.kernel.org/stable/c/94991728c84f8df54fd9eec9b85855ef9057ea08 - () https://git.kernel.org/stable/c/94991728c84f8df54fd9eec9b85855ef9057ea08 -
References () https://git.kernel.org/stable/c/a9ebfc405fe1be145f414eafadcbf09506082010 - () https://git.kernel.org/stable/c/a9ebfc405fe1be145f414eafadcbf09506082010 -
References () https://git.kernel.org/stable/c/ecf8320111822a1ae5d5fc512953eab46d543d0b - () https://git.kernel.org/stable/c/ecf8320111822a1ae5d5fc512953eab46d543d0b -
References () https://git.kernel.org/stable/c/eff9704f5332a13b08fbdbe0f84059c9e7051d5f - () https://git.kernel.org/stable/c/eff9704f5332a13b08fbdbe0f84059c9e7051d5f -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bus: mhi: host: agregar verificación de alineación para el puntero de lectura del anillo de eventos. Aunque verificamos el puntero de lectura del anillo de eventos mediante "is_valid_ring_ptr" para asegurarnos de que esté en el rango del búfer, pero existe otro riesgo de que el puntero no esté alineado. Dado que esperamos que los elementos del anillo de eventos estén alineados con 128 bits (struct mhi_ring_element), un puntero de lectura no alineado podría provocar múltiples problemas como DoS o corrupción de la memoria del búfer del anillo. Por lo tanto, agregue una verificación de alineación para el puntero de lectura del anillo de eventos.

11 Mar 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-11 18:15

Updated : 2025-02-14 16:41


NVD link : CVE-2023-52494

Mitre link : CVE-2023-52494

CVE.ORG link : CVE-2023-52494


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write