CVE-2023-52494

Severity CVSS v4.0:
Pending analysis
Type:
CWE-787 Out-of-bounds Write
Publication date:
11/03/2024
Last modified:
14/02/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bus: mhi: host: Add alignment check for event ring read pointer<br /> <br /> Though we do check the event ring read pointer by "is_valid_ring_ptr"<br /> to make sure it is in the buffer range, but there is another risk the<br /> pointer may be not aligned. Since we are expecting event ring elements<br /> are 128 bits(struct mhi_ring_element) aligned, an unaligned read pointer<br /> could lead to multiple issues like DoS or ring buffer memory corruption.<br /> <br /> So add a alignment check for event ring read pointer.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.13 (including) 5.15.149 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.76 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.15 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.7.3 (excluding)