In the Linux kernel, the following vulnerability has been resolved:
powerpc/lib: Validate size for vector operations
Some of the fp/vmx code in sstep.c assume a certain maximum size for the
instructions being emulated. The size of those operations however is
determined separately in analyse_instr().
Add a check to validate the assumption on the maximum size of the
operations, so as to prevent any unintended kernel stack corruption.
References
Configurations
Configuration 1 (hide)
|
History
14 Feb 2025, 16:40
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-770 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
References | () https://git.kernel.org/stable/c/0580f4403ad33f379eef865c2a6fe94de37febdf - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/28b8ba8eebf26f66d9f2df4ba550b6b3b136082c - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/42084a428a139f1a429f597d44621e3a18f3e414 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/848e1d7fd710900397e1d0e7584680c1c04e3afd - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/8f9abaa6d7de0a70fc68acaedce290c1f96e2e59 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/abd26515d4b767ba48241eea77b28ce0872aef3e - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/beee482cc4c9a6b1dcffb2e190b4fd8782258678 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/de4f5ed63b8a199704d8cdcbf810309d7eb4b36b - Mailing List, Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List, Patch |
21 Nov 2024, 08:40
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/0580f4403ad33f379eef865c2a6fe94de37febdf - | |
References | () https://git.kernel.org/stable/c/28b8ba8eebf26f66d9f2df4ba550b6b3b136082c - | |
References | () https://git.kernel.org/stable/c/42084a428a139f1a429f597d44621e3a18f3e414 - | |
References | () https://git.kernel.org/stable/c/848e1d7fd710900397e1d0e7584680c1c04e3afd - | |
References | () https://git.kernel.org/stable/c/8f9abaa6d7de0a70fc68acaedce290c1f96e2e59 - | |
References | () https://git.kernel.org/stable/c/abd26515d4b767ba48241eea77b28ce0872aef3e - | |
References | () https://git.kernel.org/stable/c/beee482cc4c9a6b1dcffb2e190b4fd8782258678 - | |
References | () https://git.kernel.org/stable/c/de4f5ed63b8a199704d8cdcbf810309d7eb4b36b - |
04 Nov 2024, 13:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 Mar 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-06 07:15
Updated : 2025-02-14 16:40
NVD link : CVE-2023-52606
Mitre link : CVE-2023-52606
CVE.ORG link : CVE-2023-52606
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-770
Allocation of Resources Without Limits or Throttling