CVE-2023-52606

high

Description

In the Linux kernel, the following vulnerability has been resolved: powerpc/lib: Validate size for vector operations Some of the fp/vmx code in sstep.c assume a certain maximum size for the instructions being emulated. The size of those operations however is determined separately in analyse_instr(). Add a check to validate the assumption on the maximum size of the operations, so as to prevent any unintended kernel stack corruption.

References

https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html

https://git.kernel.org/stable/c/de4f5ed63b8a199704d8cdcbf810309d7eb4b36b

https://git.kernel.org/stable/c/beee482cc4c9a6b1dcffb2e190b4fd8782258678

https://git.kernel.org/stable/c/abd26515d4b767ba48241eea77b28ce0872aef3e

https://git.kernel.org/stable/c/8f9abaa6d7de0a70fc68acaedce290c1f96e2e59

https://git.kernel.org/stable/c/848e1d7fd710900397e1d0e7584680c1c04e3afd

https://git.kernel.org/stable/c/42084a428a139f1a429f597d44621e3a18f3e414

https://git.kernel.org/stable/c/28b8ba8eebf26f66d9f2df4ba550b6b3b136082c

https://git.kernel.org/stable/c/0580f4403ad33f379eef865c2a6fe94de37febdf

Details

Source: Mitre, NVD

Published: 2024-03-06

Updated: 2024-06-25

Risk Information

CVSS v2

Base Score: 6.2

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 7.1

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Severity: High