CVE-2023-52619

In the Linux kernel, the following vulnerability has been resolved: pstore/ram: Fix crash when setting number of cpus to an odd number When the number of cpu cores is adjusted to 7 or other odd numbers, the zone size will become an odd number. The address of the zone will become: addr of zone0 = BASE addr of zone1 = BASE + zone_size addr of zone2 = BASE + zone_size*2 ... The address of zone1/3/5/7 will be mapped to non-alignment va. Eventually crashes will occur when accessing these va. So, use ALIGN_DOWN() to make sure the zone size is even to avoid this bug.
References
Link Resource
https://git.kernel.org/stable/c/0593cfd321df9001142a9d2c58d4144917dff7ee Mailing List Patch
https://git.kernel.org/stable/c/0593cfd321df9001142a9d2c58d4144917dff7ee Mailing List Patch
https://git.kernel.org/stable/c/2a37905d47bffec61e95d99f0c1cc5dc6377956c Mailing List Patch
https://git.kernel.org/stable/c/2a37905d47bffec61e95d99f0c1cc5dc6377956c Mailing List Patch
https://git.kernel.org/stable/c/75b0f71b26b3ad833c5c0670109c0af6e021e86a Mailing List Patch
https://git.kernel.org/stable/c/75b0f71b26b3ad833c5c0670109c0af6e021e86a Mailing List Patch
https://git.kernel.org/stable/c/8b69c30f4e8b69131d92096cb296dc1f217101e4 Mailing List Patch
https://git.kernel.org/stable/c/8b69c30f4e8b69131d92096cb296dc1f217101e4 Mailing List Patch
https://git.kernel.org/stable/c/a63e48cd835c34c38ef671d344cc029b1ea5bf10 Mailing List Patch
https://git.kernel.org/stable/c/a63e48cd835c34c38ef671d344cc029b1ea5bf10 Mailing List Patch
https://git.kernel.org/stable/c/cd40e43f870cf21726b22487a95ed223790b3542 Mailing List Patch
https://git.kernel.org/stable/c/cd40e43f870cf21726b22487a95ed223790b3542 Mailing List Patch
https://git.kernel.org/stable/c/d49270a04623ce3c0afddbf3e984cb245aa48e9c Mailing List Patch
https://git.kernel.org/stable/c/d49270a04623ce3c0afddbf3e984cb245aa48e9c Mailing List Patch
https://git.kernel.org/stable/c/e9f6ac50890104fdf8194f2865680689239d30fb Mailing List Patch
https://git.kernel.org/stable/c/e9f6ac50890104fdf8194f2865680689239d30fb Mailing List Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html Mailing List
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html Mailing List
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 08:40

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
References () https://git.kernel.org/stable/c/cd40e43f870cf21726b22487a95ed223790b3542 - () https://git.kernel.org/stable/c/cd40e43f870cf21726b22487a95ed223790b3542 - Mailing List, Patch
References () https://git.kernel.org/stable/c/e9f6ac50890104fdf8194f2865680689239d30fb - () https://git.kernel.org/stable/c/e9f6ac50890104fdf8194f2865680689239d30fb - Mailing List, Patch
References () https://git.kernel.org/stable/c/2a37905d47bffec61e95d99f0c1cc5dc6377956c - () https://git.kernel.org/stable/c/2a37905d47bffec61e95d99f0c1cc5dc6377956c - Mailing List, Patch
References () https://git.kernel.org/stable/c/0593cfd321df9001142a9d2c58d4144917dff7ee - () https://git.kernel.org/stable/c/0593cfd321df9001142a9d2c58d4144917dff7ee - Mailing List, Patch
References () https://git.kernel.org/stable/c/a63e48cd835c34c38ef671d344cc029b1ea5bf10 - () https://git.kernel.org/stable/c/a63e48cd835c34c38ef671d344cc029b1ea5bf10 - Mailing List, Patch
References () https://git.kernel.org/stable/c/8b69c30f4e8b69131d92096cb296dc1f217101e4 - () https://git.kernel.org/stable/c/8b69c30f4e8b69131d92096cb296dc1f217101e4 - Mailing List, Patch
References () https://git.kernel.org/stable/c/75b0f71b26b3ad833c5c0670109c0af6e021e86a - () https://git.kernel.org/stable/c/75b0f71b26b3ad833c5c0670109c0af6e021e86a - Mailing List, Patch
References () https://git.kernel.org/stable/c/d49270a04623ce3c0afddbf3e984cb245aa48e9c - () https://git.kernel.org/stable/c/d49270a04623ce3c0afddbf3e984cb245aa48e9c - Mailing List, Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Debian debian Linux
Debian
Linux linux Kernel
Linux

04 Nov 2024, 13:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'name': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'tags': [], 'refsource': ''}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'name': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'tags': [], 'refsource': ''}

27 Jun 2024, 12:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

18 Mar 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-18 11:15

Updated : 2025-03-10 15:48


NVD link : CVE-2023-52619

Mitre link : CVE-2023-52619


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux