CVE-2023-52633

Source
https://cve.org/CVERecord?id=CVE-2023-52633
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52633.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52633
Downstream
Related
Published
2024-04-02T06:49:11.596Z
Modified
2026-03-13T07:48:06.820657Z
Summary
um: time-travel: fix time corruption
Details

In the Linux kernel, the following vulnerability has been resolved:

um: time-travel: fix time corruption

In 'basic' time-travel mode (without =inf-cpu or =ext), we still get timer interrupts. These can happen at arbitrary points in time, i.e. while in timer_read(), which pushes time forward just a little bit. Then, if we happen to get the interrupt after calculating the new time to push to, but before actually finishing that, the interrupt will set the time to a value that's incompatible with the forward, and we'll crash because time goes backwards when we do the forwarding.

Fix this by reading the timetraveltime, calculating the adjustment, and doing the adjustment all with interrupts disabled.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52633.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
065038706f77a56754e8f0c2556dab7e22dfe577
Fixed
0c7478a2da3f5fe106b4658338873d50c86ac7ab
Fixed
4f7dad73df4cdb2b7042103d3922745d040ad025
Fixed
de3e9d8e8d1ae0a4d301109d1ec140796901306c
Fixed
b427f55e9d4185f6f17cc1e3296eb8d0c4425283
Fixed
abe4eaa8618bb36c2b33e9cdde0499296a23448c

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52633.json"