NULL pointer dereference in Linux kernel - CVE-2023-52568
Published: June 1, 2024 / Updated: May 14, 2025
Linux kernel
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sgx_encl_eldu(), __sgx_encl_load_page() and sgx_encl_eaug_page() functions in arch/x86/kernel/cpu/sgx/encl.c. A local user can perform a denial of service (DoS) attack.
Remediation
External links
- https://git.kernel.org/stable/c/811ba2ef0cb6402672e64ba1419d6ef95aa3405d
- https://git.kernel.org/stable/c/1348f7f15d7c7798456856bee74a4235c2da994e
- https://git.kernel.org/stable/c/c6c2adcba50c2622ed25ba5d5e7f05f584711358
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.56
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.6
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6