-

CVE-2023-53184

In the Linux kernel, the following vulnerability has been resolved:

arm64/sme: Set new vector length before reallocating

As part of fixing the allocation of the buffer for SVE state when changing
SME vector length we introduced an immediate reallocation of the SVE state,
this is also done when changing the SVE vector length for consistency.
Unfortunately this reallocation is done prior to writing the new vector
length to the task struct, meaning the allocation is done with the old
vector length and can lead to memory corruption due to an undersized buffer
being used.

Move the update of the vector length before the allocation to ensure that
the new vector length is taken into account.

For some reason this isn't triggering any problems when running tests on
the arm64 fixes branch (even after repeated tries) but is triggering
issues very often after merge into mainline.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 356e711640aea6ed145da9407499388b45264cb4
Version aa5cf8bd1318b6e7d500668b318c07a71cde783b
Status affected
Version < 807ada0e4aa3c9090c66009a99fa530c462012c9
Version 292f0453b0d021bb1d3f64648bfdfca093512214
Status affected
Version < 05d881b85b48c7ac6a7c92ce00aa916c4a84d052
Version d4d5be94a87872421ea2569044092535aff0b886
Status affected
VendorLinux
Product Linux
Default Statusunaffected
Version < 6.1.43
Version 6.1.42
Status affected
Version < 6.4.8
Version 6.4.7
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.043
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string