Lucene search

K
vulnrichmentLinuxVULNRICHMENT:CVE-2023-52494
HistoryFeb 29, 2024 - 3:52 p.m.

CVE-2023-52494 bus: mhi: host: Add alignment check for event ring read pointer

2024-02-2915:52:11
Linux
github.com
5
linux kernel
vulnerability
resolved
event ring
alignment check
dos
memory corruption

AI Score

6.8

Confidence

Low

EPSS

0

Percentile

15.5%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

In the Linux kernel, the following vulnerability has been resolved:

bus: mhi: host: Add alignment check for event ring read pointer

Though we do check the event ring read pointer by “is_valid_ring_ptr”
to make sure it is in the buffer range, but there is another risk the
pointer may be not aligned. Since we are expecting event ring elements
are 128 bits(struct mhi_ring_element) aligned, an unaligned read pointer
could lead to multiple issues like DoS or ring buffer memory corruption.

So add a alignment check for event ring read pointer.

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/bus/mhi/host/main.c"
    ],
    "versions": [
      {
        "version": "ec32332df764",
        "lessThan": "94991728c84f",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "ec32332df764",
        "lessThan": "2df39ac8f813",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "ec32332df764",
        "lessThan": "a9ebfc405fe1",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "ec32332df764",
        "lessThan": "ecf832011182",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "ec32332df764",
        "lessThan": "eff9704f5332",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/bus/mhi/host/main.c"
    ],
    "versions": [
      {
        "version": "5.13",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "5.13",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.15.149",
        "lessThanOrEqual": "5.15.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.1.76",
        "lessThanOrEqual": "6.1.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.6.15",
        "lessThanOrEqual": "6.6.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.7.3",
        "lessThanOrEqual": "6.7.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.8",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

AI Score

6.8

Confidence

Low

EPSS

0

Percentile

15.5%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial