Bug 1223768 (CVE-2023-52649) - VUL-0: CVE-2023-52649: kernel: drm/vkms: Avoid reading beyond LUT array
Summary: VUL-0: CVE-2023-52649: kernel: drm/vkms: Avoid reading beyond LUT array
Status: RESOLVED FIXED
Alias: CVE-2023-52649
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/403806/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-52649:5.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-05-02 14:38 UTC by SMASH SMASH
Modified: 2024-07-08 14:43 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-05-02 14:38:28 UTC
In the Linux kernel, the following vulnerability has been resolved:

drm/vkms: Avoid reading beyond LUT array

When the floor LUT index (drm_fixp2int(lut_index) is the last
index of the array the ceil LUT index will point to an entry
beyond the array. Make sure we guard against it and use the
value of the floor LUT index.

v3:
 - Drop bits from commit description that didn't contribute
   anything of value

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-52649
https://www.cve.org/CVERecord?id=CVE-2023-52649
https://git.kernel.org/stable/c/046c1184ce60b0a37d48134f17ddbc1f32ce02bd
https://git.kernel.org/stable/c/2fee84030d12d9fddfa874e4562d71761a129277
https://git.kernel.org/stable/c/92800aaeff51b8358d1e0a7eb74daf8aa2d7ce9d
https://git.kernel.org/stable/c/9556c167673057d48ce4a0da675026fe046654c1
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2023/CVE-2023-52649.mbox
https://bugzilla.redhat.com/show_bug.cgi?id=2278524
Comment 2 Andrea Mattiazzo 2024-05-06 07:35:20 UTC
All done, closing.