CVE-2023-52606

Source
https://cve.org/CVERecord?id=CVE-2023-52606
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52606.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-52606
Downstream
Related
Published
2024-03-06T06:45:31.257Z
Modified
2026-03-14T12:23:13.157893Z
Summary
powerpc/lib: Validate size for vector operations
Details

In the Linux kernel, the following vulnerability has been resolved:

powerpc/lib: Validate size for vector operations

Some of the fp/vmx code in sstep.c assume a certain maximum size for the instructions being emulated. The size of those operations however is determined separately in analyse_instr().

Add a check to validate the assumption on the maximum size of the operations, so as to prevent any unintended kernel stack corruption.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52606.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c22435a5f3d8f85ea162ae523a6ba60a58521ba5
Fixed
42084a428a139f1a429f597d44621e3a18f3e414
Fixed
0580f4403ad33f379eef865c2a6fe94de37febdf
Fixed
beee482cc4c9a6b1dcffb2e190b4fd8782258678
Fixed
de4f5ed63b8a199704d8cdcbf810309d7eb4b36b
Fixed
abd26515d4b767ba48241eea77b28ce0872aef3e
Fixed
28b8ba8eebf26f66d9f2df4ba550b6b3b136082c
Fixed
848e1d7fd710900397e1d0e7584680c1c04e3afd
Fixed
8f9abaa6d7de0a70fc68acaedce290c1f96e2e59

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52606.json"