CVE-2023-52495

In the Linux kernel, the following vulnerability has been resolved: soc: qcom: pmic_glink_altmode: fix port sanity check The PMIC GLINK altmode driver currently supports at most two ports. Fix the incomplete port sanity check on notifications to avoid accessing and corrupting memory beyond the port array if we ever get a notification for an unsupported port.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Feb 2025, 16:39

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/532a5557da6892a6b2d5793052e1bce1f4c9e177 - () https://git.kernel.org/stable/c/532a5557da6892a6b2d5793052e1bce1f4c9e177 - Mailing List, Patch
References () https://git.kernel.org/stable/c/c4fb7d2eac9ff9bfc35a2e4d40c7169a332416e0 - () https://git.kernel.org/stable/c/c4fb7d2eac9ff9bfc35a2e4d40c7169a332416e0 - Mailing List, Patch
References () https://git.kernel.org/stable/c/d26edf4ee3672cc9828f2a3ffae34086a712574d - () https://git.kernel.org/stable/c/d26edf4ee3672cc9828f2a3ffae34086a712574d - Mailing List, Patch
CWE CWE-787
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux
Linux linux Kernel

21 Nov 2024, 08:39

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/532a5557da6892a6b2d5793052e1bce1f4c9e177 - () https://git.kernel.org/stable/c/532a5557da6892a6b2d5793052e1bce1f4c9e177 -
References () https://git.kernel.org/stable/c/c4fb7d2eac9ff9bfc35a2e4d40c7169a332416e0 - () https://git.kernel.org/stable/c/c4fb7d2eac9ff9bfc35a2e4d40c7169a332416e0 -
References () https://git.kernel.org/stable/c/d26edf4ee3672cc9828f2a3ffae34086a712574d - () https://git.kernel.org/stable/c/d26edf4ee3672cc9828f2a3ffae34086a712574d -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: soc: qcom: pmic_glink_altmode: corregir la comprobación de la integridad del puerto el controlador PMIC GLINK altmode actualmente admite como máximo dos puertos. Se corrige la verificación incompleta de la integridad del puerto en las notificaciones para evitar acceder y dañar la memoria más allá del conjunto de puertos si alguna vez recibimos una notificación de un puerto no compatible.

11 Mar 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-11 18:15

Updated : 2025-02-14 16:39


NVD link : CVE-2023-52495

Mitre link : CVE-2023-52495

CVE.ORG link : CVE-2023-52495


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write