{
  "threat_severity" : "Moderate",
  "public_date" : "2024-02-22T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: powerpc: Fix access beyond end of drmem array",
    "id" : "2265650",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2265650"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.3",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-125",
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\npowerpc/pseries/memhp: Fix access beyond end of drmem array\ndlpar_memory_remove_by_index() may access beyond the bounds of the\ndrmem lmb array when the LMB lookup fails to match an entry with the\ngiven DRC index. When the search fails, the cursor is left pointing to\n&drmem_info->lmbs[drmem_info->n_lmbs], which is one element past the\nlast valid entry in the array. The debug message at the end of the\nfunction then dereferences this pointer:\npr_debug(\"Failed to hot-remove memory at %llx\\n\",\nlmb->base_addr);\nThis was found by inspection and confirmed with KASAN:\npseries-hotplug-mem: Attempting to hot-remove LMB, drc index 1234\n==================================================================\nBUG: KASAN: slab-out-of-bounds in dlpar_memory+0x298/0x1658\nRead of size 8 at addr c000000364e97fd0 by task bash/949\ndump_stack_lvl+0xa4/0xfc (unreliable)\nprint_report+0x214/0x63c\nkasan_report+0x140/0x2e0\n__asan_load8+0xa8/0xe0\ndlpar_memory+0x298/0x1658\nhandle_dlpar_errorlog+0x130/0x1d0\ndlpar_store+0x18c/0x3e0\nkobj_attr_store+0x68/0xa0\nsysfs_kf_write+0xc4/0x110\nkernfs_fop_write_iter+0x26c/0x390\nvfs_write+0x2d4/0x4e0\nksys_write+0xac/0x1a0\nsystem_call_exception+0x268/0x530\nsystem_call_vectored_common+0x15c/0x2ec\nAllocated by task 1:\nkasan_save_stack+0x48/0x80\nkasan_set_track+0x34/0x50\nkasan_save_alloc_info+0x34/0x50\n__kasan_kmalloc+0xd0/0x120\n__kmalloc+0x8c/0x320\nkmalloc_array.constprop.0+0x48/0x5c\ndrmem_init+0x2a0/0x41c\ndo_one_initcall+0xe0/0x5c0\nkernel_init_freeable+0x4ec/0x5a0\nkernel_init+0x30/0x1e0\nret_from_kernel_user_thread+0x14/0x1c\nThe buggy address belongs to the object at c000000364e80000\nwhich belongs to the cache kmalloc-128k of size 131072\nThe buggy address is located 0 bytes to the right of\nallocated 98256-byte region [c000000364e80000, c000000364e97fd0)\n==================================================================\npseries-hotplug-mem: Failed to hot-remove memory at 0\nLog failed lookups with a separate message and dereference the\ncursor only when it points to a valid entry.", "A flaw was found in the Linux kernel, specifically affecting the PowerPC architecture's pseries memory hotplug functionality. The issue arises from the dlpar_memory_remove_by_index() function, which may access memory beyond the bounds of the drmem logical memory block (LMB) array when it fails to find a matching entry for a given Dynamic Reconfiguration Connector (DRC) index. This out-of-bounds access can lead to unintended behavior, including potential system crashes or exposure of sensitive information." ],
  "statement" : "The vulnerability was discovered through code inspection and confirmed using Kernel Address Sanitizer (KASAN) tools. To address this issue, the Linux kernel has been updated to ensure that failed lookups are logged separately, and pointers are dereferenced only when they point to valid entries.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2024-08-08T00:00:00Z",
    "advisory" : "RHSA-2024:5101",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "kernel-0:4.18.0-553.16.1.el8_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-11-12T00:00:00Z",
    "advisory" : "RHSA-2024:9315",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-503.11.1.el9_5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-11-12T00:00:00Z",
    "advisory" : "RHSA-2024:9315",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-503.11.1.el9_5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.4 Extended Update Support",
    "release_date" : "2025-08-06T00:00:00Z",
    "advisory" : "RHSA-2025:13135",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.4",
    "package" : "kernel-0:5.14.0-427.81.1.el9_4"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-52451\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52451\nhttps://lore.kernel.org/linux-cve-announce/2024022257-CVE-2023-52451-7bdb@gregkh/T/#u" ],
  "name" : "CVE-2023-52451",
  "mitigation" : {
    "value" : "No mitigation is currently available for this vulnerability. Make sure to perform the updates as they become available.",
    "lang" : "en:us"
  },
  "csaw" : false
}