SB2024060813 - Stack-based buffer overflow in Linux kernel include asm
Published: June 8, 2024 Updated: May 13, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Stack-based buffer overflow (CVE-ID: CVE-2023-52761)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to stack overflow within the is_valid_bugaddr() function in arch/riscv/kernel/traps.c, within the SYM_CODE_START() and SYM_CODE_END() functions in arch/riscv/kernel/entry.S, within the asm_offsets() function in arch/riscv/kernel/asm-offsets.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/1493baaf09e3c1899959c8a107cd1207e16d1788
- https://git.kernel.org/stable/c/eff53aea3855f71992c043cebb1c00988c17ee20
- https://git.kernel.org/stable/c/be97d0db5f44c0674480cb79ac6f5b0529b84c76
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.13
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.3
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.7