SB2024060561 - Buffer overflow in Linux kernel mhi host driver
Published: June 5, 2024 Updated: May 13, 2025
Security Bulletin ID
SB2024060561
Severity
Low
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Local access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2023-52494)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the mhi_del_ring_element() function in drivers/bus/mhi/host/main.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/94991728c84f8df54fd9eec9b85855ef9057ea08
- https://git.kernel.org/stable/c/2df39ac8f813860f79782807c3f7acff40b3c551
- https://git.kernel.org/stable/c/a9ebfc405fe1be145f414eafadcbf09506082010
- https://git.kernel.org/stable/c/ecf8320111822a1ae5d5fc512953eab46d543d0b
- https://git.kernel.org/stable/c/eff9704f5332a13b08fbdbe0f84059c9e7051d5f
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.149
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.76
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.15
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.7.3
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.8