CVE-2023-52659Linux vulnerability

17 documents8 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 90.62%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 17
Latest updateJul 4

Description

In the Linux kernel, the following vulnerability has been resolved: x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type On 64-bit platforms, the pfn_to_kaddr() macro requires that the input value is 64 bits in order to ensure that valid address bits don't get lost when shifting that input by PAGE_SHIFT to calculate the physical address to provide a virtual address for. One such example is in pvalidate_pages() (used by SEV-SNP guests), where the GFN in the struct used for page-s

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages9 packages

NVDlinux/linux_kernel6.56.6.23+2
Debianlinux/linux_kernel< 6.7.12-1+1
Ubuntulinux/linux_kernel< 6.8.0-35.35
CVEListV5linux/linux6c3211796326a9d35618b866826ca556c8f008a8325956b0173f11e98f90462be4829a8b8b0682ce+4
debiandebian/linux< linux 6.7.12-1 (forky)

Patches

🔴Vulnerability Details

7
OSV
linux-oracle vulnerabilities2024-07-04
OSV
linux-azure, linux-gke vulnerabilities2024-06-14
OSV
linux-oem-6.8 vulnerabilities2024-06-11
OSV
linux, linux-ibm, linux-lowlatency, linux-raspi vulnerabilities2024-06-07
OSV
linux-aws, linux-gcp vulnerabilities2024-06-07

📋Vendor Advisories

8
Ubuntu
Linux kernel (Oracle) vulnerabilities2024-07-04
Ubuntu
Linux kernel vulnerabilities2024-06-14
Ubuntu
Linux kernel (OEM) vulnerabilities2024-06-11
Ubuntu
Linux kernel vulnerabilities2024-06-07
Ubuntu
Linux kernel vulnerabilities2024-06-07

💬Community

1
Bugzilla
CVE-2023-52659 kernel: x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type2024-05-17