Bug 1223768 (CVE-2023-52649)

Summary: VUL-0: CVE-2023-52649: kernel: drm/vkms: Avoid reading beyond LUT array
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: andrea.mattiazzo, vasant.karasulli
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/403806/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-52649:5.5:(AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-05-02 14:38:28 UTC
In the Linux kernel, the following vulnerability has been resolved:

drm/vkms: Avoid reading beyond LUT array

When the floor LUT index (drm_fixp2int(lut_index) is the last
index of the array the ceil LUT index will point to an entry
beyond the array. Make sure we guard against it and use the
value of the floor LUT index.

v3:
 - Drop bits from commit description that didn't contribute
   anything of value

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-52649
https://www.cve.org/CVERecord?id=CVE-2023-52649
https://git.kernel.org/stable/c/046c1184ce60b0a37d48134f17ddbc1f32ce02bd
https://git.kernel.org/stable/c/2fee84030d12d9fddfa874e4562d71761a129277
https://git.kernel.org/stable/c/92800aaeff51b8358d1e0a7eb74daf8aa2d7ce9d
https://git.kernel.org/stable/c/9556c167673057d48ce4a0da675026fe046654c1
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2023/CVE-2023-52649.mbox
https://bugzilla.redhat.com/show_bug.cgi?id=2278524
Comment 2 Andrea Mattiazzo 2024-05-06 07:35:20 UTC
All done, closing.