First published: Thu Feb 29 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: soc: qcom: pmic_glink_altmode: fix port sanity check The PMIC GLINK altmode driver currently supports at most two ports. Fix the incomplete port sanity check on notifications to avoid accessing and corrupting memory beyond the port array if we ever get a notification for an unsupported port.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52495 has been classified as a moderate severity vulnerability in the Linux kernel.
To fix CVE-2023-52495, update the Linux kernel to one of the patched versions: 5.10.223-1, 5.10.226-1, 6.1.119-1, 6.1.123-1, 6.12.11-1, or 6.12.12-1.
CVE-2023-52495 affects multiple versions of the Linux kernel including 5.10.x, 6.1.x, and 6.12.x.
If CVE-2023-52495 is left unpatched, it could lead to potential access and corruption of memory due to inadequate port sanity checks.
Currently, there are no documented workarounds for CVE-2023-52495, and applying the recommended updates is the best course of action.