2024-02-20 13:00:36 +00:00
{
2024-02-29 16:00:34 +00:00
"data_version" : "4.0" ,
2024-02-20 13:00:36 +00:00
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"CVE_data_meta" : {
"ID" : "CVE-2023-52494" ,
2024-02-29 16:00:34 +00:00
"ASSIGNER" : "cve@kernel.org" ,
"STATE" : "PUBLIC"
2024-02-20 13:00:36 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2024-02-29 16:00:34 +00:00
"value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: mhi: host: Add alignment check for event ring read pointer\n\nThough we do check the event ring read pointer by \"is_valid_ring_ptr\"\nto make sure it is in the buffer range, but there is another risk the\npointer may be not aligned. Since we are expecting event ring elements\nare 128 bits(struct mhi_ring_element) aligned, an unaligned read pointer\ncould lead to multiple issues like DoS or ring buffer memory corruption.\n\nSo add a alignment check for event ring read pointer."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "Linux" ,
"product" : {
"product_data" : [
{
"product_name" : "Linux" ,
"version" : {
"version_data" : [
{
"version_affected" : "<" ,
"version_name" : "ec32332df764" ,
"version_value" : "94991728c84f"
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "5.13" ,
"status" : "affected"
} ,
{
"version" : "0" ,
"lessThan" : "5.13" ,
"status" : "unaffected" ,
2024-11-04 13:03:16 +00:00
"versionType" : "semver"
2024-02-29 16:00:34 +00:00
} ,
{
"version" : "5.15.149" ,
"lessThanOrEqual" : "5.15.*" ,
"status" : "unaffected" ,
2024-11-04 13:03:16 +00:00
"versionType" : "semver"
2024-02-29 16:00:34 +00:00
} ,
{
"version" : "6.1.76" ,
"lessThanOrEqual" : "6.1.*" ,
"status" : "unaffected" ,
2024-11-04 13:03:16 +00:00
"versionType" : "semver"
2024-02-29 16:00:34 +00:00
} ,
{
"version" : "6.6.15" ,
"lessThanOrEqual" : "6.6.*" ,
"status" : "unaffected" ,
2024-11-04 13:03:16 +00:00
"versionType" : "semver"
2024-02-29 16:00:34 +00:00
} ,
{
"version" : "6.7.3" ,
"lessThanOrEqual" : "6.7.*" ,
"status" : "unaffected" ,
2024-11-04 13:03:16 +00:00
"versionType" : "semver"
2024-02-29 16:00:34 +00:00
} ,
{
2024-04-01 20:42:13 +00:00
"version" : "6.8" ,
2024-02-29 16:00:34 +00:00
"lessThanOrEqual" : "*" ,
"status" : "unaffected" ,
"versionType" : "original_commit_for_fix"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
}
]
}
}
]
}
} ,
"references" : {
"reference_data" : [
{
"url" : "https://git.kernel.org/stable/c/94991728c84f8df54fd9eec9b85855ef9057ea08" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/94991728c84f8df54fd9eec9b85855ef9057ea08"
} ,
{
"url" : "https://git.kernel.org/stable/c/2df39ac8f813860f79782807c3f7acff40b3c551" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/2df39ac8f813860f79782807c3f7acff40b3c551"
} ,
{
"url" : "https://git.kernel.org/stable/c/a9ebfc405fe1be145f414eafadcbf09506082010" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/a9ebfc405fe1be145f414eafadcbf09506082010"
} ,
{
"url" : "https://git.kernel.org/stable/c/ecf8320111822a1ae5d5fc512953eab46d543d0b" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/ecf8320111822a1ae5d5fc512953eab46d543d0b"
} ,
{
"url" : "https://git.kernel.org/stable/c/eff9704f5332a13b08fbdbe0f84059c9e7051d5f" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/eff9704f5332a13b08fbdbe0f84059c9e7051d5f"
2024-02-20 13:00:36 +00:00
}
]
2024-02-29 16:00:34 +00:00
} ,
"generator" : {
2024-11-04 13:03:16 +00:00
"engine" : "bippy-9e1c9544281a"
2024-02-20 13:00:36 +00:00
}
}