CVE-2023-52677

Source
https://cve.org/CVERecord?id=CVE-2023-52677
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52677.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-52677
Downstream
Related
Published
2024-05-17T14:24:42.051Z
Modified
2026-03-14T12:23:13.722848Z
Summary
riscv: Check if the code to patch lies in the exit section
Details

In the Linux kernel, the following vulnerability has been resolved:

riscv: Check if the code to patch lies in the exit section

Otherwise we fall through to vmalloctopage() which panics since the address does not lie in the vmalloc region.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52677.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
043cb41a85de1c0e944da61ad7a264960e22c865
Fixed
938f70d14618ec72e10d6fcf8a546134136d7c13
Fixed
890cfe5337e0aaf03ece1429db04d23c88da72e7
Fixed
8db56df4a954b774bdc68917046a685a9fa2e4bc
Fixed
1d7a03052846f34d624d0ab41a879adf5e85c85f
Fixed
420370f3ae3d3b883813fd3051a38805160b2b9f

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52677.json"