In the Linux kernel, the following vulnerability has been resolved: riscv: kvm: Fix out-of-bounds array access In kvm_riscv_vcpu_sbi_init() the entry->ext_idx can contain an out-of-bound index. This is used as a special marker for the base extensions, that cannot be disabled. However, when traversing the extensions, that special marker is not checked prior indexing the array. Add an out-of-bounds check to the function.
History

Fri, 27 Dec 2024 14:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: riscv: kvm: Fix out-of-bounds array access In kvm_riscv_vcpu_sbi_init() the entry->ext_idx can contain an out-of-bound index. This is used as a special marker for the base extensions, that cannot be disabled. However, when traversing the extensions, that special marker is not checked prior indexing the array. Add an out-of-bounds check to the function.
Title riscv: kvm: Fix out-of-bounds array access
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-12-27T13:50:16.843Z

Updated: 2024-12-27T13:50:16.843Z

Reserved: 2024-11-19T17:17:25.025Z

Link: CVE-2024-53228

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2024-12-27T14:15:31.057

Modified: 2024-12-27T14:15:31.057

Link: CVE-2024-53228

cve-icon Redhat

No data.