Vulnerability Details : CVE-2023-52677
In the Linux kernel, the following vulnerability has been resolved:
riscv: Check if the code to patch lies in the exit section
Otherwise we fall through to vmalloc_to_page() which panics since the
address does not lie in the vmalloc region.
Products affected by CVE-2023-52677
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2023-52677
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 29 %
Percentile, the proportion of vulnerabilities that are scored at or less
References for CVE-2023-52677
-
https://git.kernel.org/stable/c/8db56df4a954b774bdc68917046a685a9fa2e4bc
riscv: Check if the code to patch lies in the exit section - kernel/git/stable/linux.git - Linux kernel stable tree
-
https://git.kernel.org/stable/c/1d7a03052846f34d624d0ab41a879adf5e85c85f
riscv: Check if the code to patch lies in the exit section - kernel/git/stable/linux.git - Linux kernel stable tree
-
https://git.kernel.org/stable/c/420370f3ae3d3b883813fd3051a38805160b2b9f
riscv: Check if the code to patch lies in the exit section - kernel/git/stable/linux.git - Linux kernel stable tree
-
https://git.kernel.org/stable/c/890cfe5337e0aaf03ece1429db04d23c88da72e7
riscv: Check if the code to patch lies in the exit section - kernel/git/stable/linux.git - Linux kernel stable tree
-
https://git.kernel.org/stable/c/938f70d14618ec72e10d6fcf8a546134136d7c13
riscv: Check if the code to patch lies in the exit section - kernel/git/stable/linux.git - Linux kernel stable tree
Jump to