Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2023-52606 |
CWE-ID | CWE-119 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU87343
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52606
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error within the fp/vmx code in powerpc/lib/sstep.c. A local user can trigger memory corruption and perform a denial of service (DoS) attack.
Install updates from vendor's website.
Vulnerable software versionsLinux kernel: 4.19 - 6.8 rc5
CPE2.3https://git.kernel.org/stable/c/42084a428a139f1a429f597d44621e3a18f3e414
https://git.kernel.org/stable/c/0580f4403ad33f379eef865c2a6fe94de37febdf
https://git.kernel.org/stable/c/beee482cc4c9a6b1dcffb2e190b4fd8782258678
https://git.kernel.org/stable/c/de4f5ed63b8a199704d8cdcbf810309d7eb4b36b
https://git.kernel.org/stable/c/abd26515d4b767ba48241eea77b28ce0872aef3e
https://git.kernel.org/stable/c/28b8ba8eebf26f66d9f2df4ba550b6b3b136082c
https://git.kernel.org/stable/c/848e1d7fd710900397e1d0e7584680c1c04e3afd
https://git.kernel.org/stable/c/8f9abaa6d7de0a70fc68acaedce290c1f96e2e59
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.307
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.210
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.149
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.269
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.77
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.16
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.7.4
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.8
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.