CVE-2023-52633

In the Linux kernel, the following vulnerability has been resolved: um: time-travel: fix time corruption In 'basic' time-travel mode (without =inf-cpu or =ext), we still get timer interrupts. These can happen at arbitrary points in time, i.e. while in timer_read(), which pushes time forward just a little bit. Then, if we happen to get the interrupt after calculating the new time to push to, but before actually finishing that, the interrupt will set the time to a value that's incompatible with the forward, and we'll crash because time goes backwards when we do the forwarding. Fix this by reading the time_travel_time, calculating the adjustment, and doing the adjustment all with interrupts disabled.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

17 Mar 2025, 15:17

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0c7478a2da3f5fe106b4658338873d50c86ac7ab - () https://git.kernel.org/stable/c/0c7478a2da3f5fe106b4658338873d50c86ac7ab - Patch
References () https://git.kernel.org/stable/c/4f7dad73df4cdb2b7042103d3922745d040ad025 - () https://git.kernel.org/stable/c/4f7dad73df4cdb2b7042103d3922745d040ad025 - Patch
References () https://git.kernel.org/stable/c/abe4eaa8618bb36c2b33e9cdde0499296a23448c - () https://git.kernel.org/stable/c/abe4eaa8618bb36c2b33e9cdde0499296a23448c - Patch
References () https://git.kernel.org/stable/c/b427f55e9d4185f6f17cc1e3296eb8d0c4425283 - () https://git.kernel.org/stable/c/b427f55e9d4185f6f17cc1e3296eb8d0c4425283 - Patch
References () https://git.kernel.org/stable/c/de3e9d8e8d1ae0a4d301109d1ec140796901306c - () https://git.kernel.org/stable/c/de3e9d8e8d1ae0a4d301109d1ec140796901306c - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.0
CWE CWE-787
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux

21 Nov 2024, 08:40

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0c7478a2da3f5fe106b4658338873d50c86ac7ab - () https://git.kernel.org/stable/c/0c7478a2da3f5fe106b4658338873d50c86ac7ab -
References () https://git.kernel.org/stable/c/4f7dad73df4cdb2b7042103d3922745d040ad025 - () https://git.kernel.org/stable/c/4f7dad73df4cdb2b7042103d3922745d040ad025 -
References () https://git.kernel.org/stable/c/abe4eaa8618bb36c2b33e9cdde0499296a23448c - () https://git.kernel.org/stable/c/abe4eaa8618bb36c2b33e9cdde0499296a23448c -
References () https://git.kernel.org/stable/c/b427f55e9d4185f6f17cc1e3296eb8d0c4425283 - () https://git.kernel.org/stable/c/b427f55e9d4185f6f17cc1e3296eb8d0c4425283 -
References () https://git.kernel.org/stable/c/de3e9d8e8d1ae0a4d301109d1ec140796901306c - () https://git.kernel.org/stable/c/de3e9d8e8d1ae0a4d301109d1ec140796901306c -

02 Apr 2024, 12:50

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: um: viaje en el tiempo: corrige la corrupción del tiempo En el modo de viaje en el tiempo 'básico' (sin =inf-cpu o =ext), todavía obtenemos interrupciones del temporizador. Esto puede suceder en momentos arbitrarios en el tiempo, es decir, mientras está en timer_read(), lo que adelanta un poco el tiempo. Luego, si recibimos la interrupción después de calcular el nuevo tiempo al que enviar, pero antes de finalizarlo, la interrupción establecerá el tiempo en un valor que es incompatible con el avance, y fallaremos porque el tiempo retrocede cuando hacer el reenvío. Solucione este problema leyendo time_travel_time, calculando el ajuste y realizando el ajuste, todo con las interrupciones desactivadas.

02 Apr 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-02 07:15

Updated : 2025-03-17 15:17


NVD link : CVE-2023-52633

Mitre link : CVE-2023-52633

CVE.ORG link : CVE-2023-52633


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write