CVE-2023-52659 — Linux vulnerability
17 documents8 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 90.62%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 17
Latest updateJul 4
Description
In the Linux kernel, the following vulnerability has been resolved:
x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type
On 64-bit platforms, the pfn_to_kaddr() macro requires that the input
value is 64 bits in order to ensure that valid address bits don't get
lost when shifting that input by PAGE_SHIFT to calculate the physical
address to provide a virtual address for.
One such example is in pvalidate_pages() (used by SEV-SNP guests), where
the GFN in the struct used for page-s…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Affected Packages9 packages
▶CVEListV5linux/linux6c3211796326a9d35618b866826ca556c8f008a8 — 325956b0173f11e98f90462be4829a8b8b0682ce+4
Patches
🔴Vulnerability Details
7📋Vendor Advisories
8💬Community
1Bugzilla▶
CVE-2023-52659 kernel: x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type↗2024-05-17