In the Linux kernel, the following vulnerability has been resolved:
bus: mhi: host: Add alignment check for event ring read pointer
Though we do check the event ring read pointer by "is_valid_ring_ptr"
to make sure it is in the buffer range, but there is another risk the
pointer may be not aligned. Since we are expecting event ring elements
are 128 bits(struct mhi_ring_element) aligned, an unaligned read pointer
could lead to multiple issues like DoS or ring buffer memory corruption.
So add a alignment check for event ring read pointer.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-02-29T15:52:11.674Z
Updated: 2024-11-04T14:47:57.452Z
Reserved: 2024-02-20T12:30:33.304Z
Link: CVE-2023-52494
Vulnrichment
Updated: 2024-08-02T23:03:20.652Z
NVD
Status : Awaiting Analysis
Published: 2024-03-11T18:15:17.000
Modified: 2024-03-12T12:40:13.500
Link: CVE-2023-52494
Redhat