CVE-2023-52995

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/03/2025
Last modified:
29/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> riscv/kprobe: Fix instruction simulation of JALR<br /> <br /> Set kprobe at &amp;#39;jalr 1140(ra)&amp;#39; of vfs_write results in the following<br /> crash:<br /> <br /> [ 32.092235] Unable to handle kernel access to user memory without uaccess routines at virtual address 00aaaaaad77b1170<br /> [ 32.093115] Oops [#1]<br /> [ 32.093251] Modules linked in:<br /> [ 32.093626] CPU: 0 PID: 135 Comm: ftracetest Not tainted 6.2.0-rc2-00013-gb0aa5e5df0cb-dirty #16<br /> [ 32.093985] Hardware name: riscv-virtio,qemu (DT)<br /> [ 32.094280] epc : ksys_read+0x88/0xd6<br /> [ 32.094855] ra : ksys_read+0xc0/0xd6<br /> [ 32.095016] epc : ffffffff801cda80 ra : ffffffff801cdab8 sp : ff20000000d7bdc0<br /> [ 32.095227] gp : ffffffff80f14000 tp : ff60000080f9cb40 t0 : ffffffff80f13e80<br /> [ 32.095500] t1 : ffffffff8000c29c t2 : ffffffff800dbc54 s0 : ff20000000d7be60<br /> [ 32.095716] s1 : 0000000000000000 a0 : ffffffff805a64ae a1 : ffffffff80a83708<br /> [ 32.095921] a2 : ffffffff80f160a0 a3 : 0000000000000000 a4 : f229b0afdb165300<br /> [ 32.096171] a5 : f229b0afdb165300 a6 : ffffffff80eeebd0 a7 : 00000000000003ff<br /> [ 32.096411] s2 : ff6000007ff76800 s3 : fffffffffffffff7 s4 : 00aaaaaad77b1170<br /> [ 32.096638] s5 : ffffffff80f160a0 s6 : ff6000007ff76800 s7 : 0000000000000030<br /> [ 32.096865] s8 : 00ffffffc3d97be0 s9 : 0000000000000007 s10: 00aaaaaad77c9410<br /> [ 32.097092] s11: 0000000000000000 t3 : ffffffff80f13e48 t4 : ffffffff8000c29c<br /> [ 32.097317] t5 : ffffffff8000c29c t6 : ffffffff800dbc54<br /> [ 32.097505] status: 0000000200000120 badaddr: 00aaaaaad77b1170 cause: 000000000000000d<br /> [ 32.098011] [] ksys_write+0x6c/0xd6<br /> [ 32.098222] [] sys_write+0x2a/0x38<br /> [ 32.098405] [] ret_from_syscall+0x0/0x2<br /> <br /> Since the rs1 and rd might be the same one, such as &amp;#39;jalr 1140(ra)&amp;#39;,<br /> hence it requires obtaining the target address from rs1 followed by<br /> updating rd.<br /> <br /> [Palmer: Pick Guo&amp;#39;s cleanup]

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.12 (including) 5.15.91 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.9 (excluding)
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:*