CVE-2023-52494

Source
https://cve.org/CVERecord?id=CVE-2023-52494
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52494.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52494
Downstream
Related
Published
2024-02-29T15:52:11.674Z
Modified
2026-03-13T07:48:02.932810Z
Summary
bus: mhi: host: Add alignment check for event ring read pointer
Details

In the Linux kernel, the following vulnerability has been resolved:

bus: mhi: host: Add alignment check for event ring read pointer

Though we do check the event ring read pointer by "isvalidringptr" to make sure it is in the buffer range, but there is another risk the pointer may be not aligned. Since we are expecting event ring elements are 128 bits(struct mhiring_element) aligned, an unaligned read pointer could lead to multiple issues like DoS or ring buffer memory corruption.

So add a alignment check for event ring read pointer.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52494.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ec32332df7645e0ba463a08d483fe97665167071
Fixed
94991728c84f8df54fd9eec9b85855ef9057ea08
Fixed
2df39ac8f813860f79782807c3f7acff40b3c551
Fixed
a9ebfc405fe1be145f414eafadcbf09506082010
Fixed
ecf8320111822a1ae5d5fc512953eab46d543d0b
Fixed
eff9704f5332a13b08fbdbe0f84059c9e7051d5f
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
a1d2bd164c1c78f87968b7883964175ec41c32ae
Last affected
fd5f40fc887485a8b9a6806a640a0d8e0ef1afb6
Last affected
76879a980cd5ede4cb9a638999fb80d37bc09db5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52494.json"