CVE-2023-52606

In the Linux kernel, the following vulnerability has been resolved: powerpc/lib: Validate size for vector operations Some of the fp/vmx code in sstep.c assume a certain maximum size for the instructions being emulated. The size of those operations however is determined separately in analyse_instr(). Add a check to validate the assumption on the maximum size of the operations, so as to prevent any unintended kernel stack corruption.
References
Link Resource
https://git.kernel.org/stable/c/0580f4403ad33f379eef865c2a6fe94de37febdf Mailing List Patch
https://git.kernel.org/stable/c/28b8ba8eebf26f66d9f2df4ba550b6b3b136082c Mailing List Patch
https://git.kernel.org/stable/c/42084a428a139f1a429f597d44621e3a18f3e414 Mailing List Patch
https://git.kernel.org/stable/c/848e1d7fd710900397e1d0e7584680c1c04e3afd Mailing List Patch
https://git.kernel.org/stable/c/8f9abaa6d7de0a70fc68acaedce290c1f96e2e59 Mailing List Patch
https://git.kernel.org/stable/c/abd26515d4b767ba48241eea77b28ce0872aef3e Mailing List Patch
https://git.kernel.org/stable/c/beee482cc4c9a6b1dcffb2e190b4fd8782258678 Mailing List Patch
https://git.kernel.org/stable/c/de4f5ed63b8a199704d8cdcbf810309d7eb4b36b Mailing List Patch
https://git.kernel.org/stable/c/0580f4403ad33f379eef865c2a6fe94de37febdf Mailing List Patch
https://git.kernel.org/stable/c/28b8ba8eebf26f66d9f2df4ba550b6b3b136082c Mailing List Patch
https://git.kernel.org/stable/c/42084a428a139f1a429f597d44621e3a18f3e414 Mailing List Patch
https://git.kernel.org/stable/c/848e1d7fd710900397e1d0e7584680c1c04e3afd Mailing List Patch
https://git.kernel.org/stable/c/8f9abaa6d7de0a70fc68acaedce290c1f96e2e59 Mailing List Patch
https://git.kernel.org/stable/c/abd26515d4b767ba48241eea77b28ce0872aef3e Mailing List Patch
https://git.kernel.org/stable/c/beee482cc4c9a6b1dcffb2e190b4fd8782258678 Mailing List Patch
https://git.kernel.org/stable/c/de4f5ed63b8a199704d8cdcbf810309d7eb4b36b Mailing List Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html Mailing List Patch
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Feb 2025, 16:40

Type Values Removed Values Added
CWE CWE-770
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0580f4403ad33f379eef865c2a6fe94de37febdf - () https://git.kernel.org/stable/c/0580f4403ad33f379eef865c2a6fe94de37febdf - Mailing List, Patch
References () https://git.kernel.org/stable/c/28b8ba8eebf26f66d9f2df4ba550b6b3b136082c - () https://git.kernel.org/stable/c/28b8ba8eebf26f66d9f2df4ba550b6b3b136082c - Mailing List, Patch
References () https://git.kernel.org/stable/c/42084a428a139f1a429f597d44621e3a18f3e414 - () https://git.kernel.org/stable/c/42084a428a139f1a429f597d44621e3a18f3e414 - Mailing List, Patch
References () https://git.kernel.org/stable/c/848e1d7fd710900397e1d0e7584680c1c04e3afd - () https://git.kernel.org/stable/c/848e1d7fd710900397e1d0e7584680c1c04e3afd - Mailing List, Patch
References () https://git.kernel.org/stable/c/8f9abaa6d7de0a70fc68acaedce290c1f96e2e59 - () https://git.kernel.org/stable/c/8f9abaa6d7de0a70fc68acaedce290c1f96e2e59 - Mailing List, Patch
References () https://git.kernel.org/stable/c/abd26515d4b767ba48241eea77b28ce0872aef3e - () https://git.kernel.org/stable/c/abd26515d4b767ba48241eea77b28ce0872aef3e - Mailing List, Patch
References () https://git.kernel.org/stable/c/beee482cc4c9a6b1dcffb2e190b4fd8782258678 - () https://git.kernel.org/stable/c/beee482cc4c9a6b1dcffb2e190b4fd8782258678 - Mailing List, Patch
References () https://git.kernel.org/stable/c/de4f5ed63b8a199704d8cdcbf810309d7eb4b36b - () https://git.kernel.org/stable/c/de4f5ed63b8a199704d8cdcbf810309d7eb4b36b - Mailing List, Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List, Patch

21 Nov 2024, 08:40

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
References () https://git.kernel.org/stable/c/0580f4403ad33f379eef865c2a6fe94de37febdf - () https://git.kernel.org/stable/c/0580f4403ad33f379eef865c2a6fe94de37febdf -
References () https://git.kernel.org/stable/c/28b8ba8eebf26f66d9f2df4ba550b6b3b136082c - () https://git.kernel.org/stable/c/28b8ba8eebf26f66d9f2df4ba550b6b3b136082c -
References () https://git.kernel.org/stable/c/42084a428a139f1a429f597d44621e3a18f3e414 - () https://git.kernel.org/stable/c/42084a428a139f1a429f597d44621e3a18f3e414 -
References () https://git.kernel.org/stable/c/848e1d7fd710900397e1d0e7584680c1c04e3afd - () https://git.kernel.org/stable/c/848e1d7fd710900397e1d0e7584680c1c04e3afd -
References () https://git.kernel.org/stable/c/8f9abaa6d7de0a70fc68acaedce290c1f96e2e59 - () https://git.kernel.org/stable/c/8f9abaa6d7de0a70fc68acaedce290c1f96e2e59 -
References () https://git.kernel.org/stable/c/abd26515d4b767ba48241eea77b28ce0872aef3e - () https://git.kernel.org/stable/c/abd26515d4b767ba48241eea77b28ce0872aef3e -
References () https://git.kernel.org/stable/c/beee482cc4c9a6b1dcffb2e190b4fd8782258678 - () https://git.kernel.org/stable/c/beee482cc4c9a6b1dcffb2e190b4fd8782258678 -
References () https://git.kernel.org/stable/c/de4f5ed63b8a199704d8cdcbf810309d7eb4b36b - () https://git.kernel.org/stable/c/de4f5ed63b8a199704d8cdcbf810309d7eb4b36b -

04 Nov 2024, 13:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

25 Jun 2024, 23:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

06 Mar 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-06 07:15

Updated : 2025-02-14 16:40


NVD link : CVE-2023-52606

Mitre link : CVE-2023-52606

CVE.ORG link : CVE-2023-52606


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-770

Allocation of Resources Without Limits or Throttling