CVE-2023-52649

In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Avoid reading beyond LUT array When the floor LUT index (drm_fixp2int(lut_index) is the last index of the array the ceil LUT index will point to an entry beyond the array. Make sure we guard against it and use the value of the floor LUT index. v3: - Drop bits from commit description that didn't contribute anything of value
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

23 Dec 2024, 19:14

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/046c1184ce60b0a37d48134f17ddbc1f32ce02bd - () https://git.kernel.org/stable/c/046c1184ce60b0a37d48134f17ddbc1f32ce02bd - Patch
References () https://git.kernel.org/stable/c/2fee84030d12d9fddfa874e4562d71761a129277 - () https://git.kernel.org/stable/c/2fee84030d12d9fddfa874e4562d71761a129277 - Patch
References () https://git.kernel.org/stable/c/92800aaeff51b8358d1e0a7eb74daf8aa2d7ce9d - () https://git.kernel.org/stable/c/92800aaeff51b8358d1e0a7eb74daf8aa2d7ce9d - Patch
References () https://git.kernel.org/stable/c/9556c167673057d48ce4a0da675026fe046654c1 - () https://git.kernel.org/stable/c/9556c167673057d48ce4a0da675026fe046654c1 - Patch
CWE CWE-129
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

21 Nov 2024, 08:40

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/vkms: Evite leer más allá de la matriz LUT Cuando el índice LUT de piso (drm_fixp2int(lut_index) es el último índice de la matriz, el índice LUT de techo apuntará a una entrada más allá de la matriz Asegúrese de protegernos contra esto y usar el valor del índice LUT de piso v3: - Elimine los bits de la descripción de confirmación que no contribuyeron con nada de valor.
References () https://git.kernel.org/stable/c/046c1184ce60b0a37d48134f17ddbc1f32ce02bd - () https://git.kernel.org/stable/c/046c1184ce60b0a37d48134f17ddbc1f32ce02bd -
References () https://git.kernel.org/stable/c/2fee84030d12d9fddfa874e4562d71761a129277 - () https://git.kernel.org/stable/c/2fee84030d12d9fddfa874e4562d71761a129277 -
References () https://git.kernel.org/stable/c/92800aaeff51b8358d1e0a7eb74daf8aa2d7ce9d - () https://git.kernel.org/stable/c/92800aaeff51b8358d1e0a7eb74daf8aa2d7ce9d -
References () https://git.kernel.org/stable/c/9556c167673057d48ce4a0da675026fe046654c1 - () https://git.kernel.org/stable/c/9556c167673057d48ce4a0da675026fe046654c1 -

01 May 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-01 13:15

Updated : 2024-12-23 19:14


NVD link : CVE-2023-52649

Mitre link : CVE-2023-52649

CVE.ORG link : CVE-2023-52649


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-129

Improper Validation of Array Index