Bug 2268455 (CVE-2023-52488)

Summary: CVE-2023-52488 kernel: serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO
Product: [Other] Security Response Reporter: Mauro Matteo Cascella <mcascell>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: acaringi, allarkin, aquini, bhu, chwhite, cye, cyin, dbohanno, debarbos, dfreiber, drow, dvlasenk, esandeen, ezulian, hkrzesin, jarod, jburrell, jdenham, jfaracco, jforbes, jlelli, joe.lawrence, jshortt, jstancek, jwyatt, kcarcia, ldoskova, lgoncalv, lzampier, mleitner, mmilgram, mstowell, nmurray, ptalbert, rparrazo, rrobaina, rvrbovsk, scweaver, sidakwo, sukulkar, tglozar, vkumar, wcosta, williams, wmealing, ycote, ykopkova, zhijwang
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: kernel 6.1.76, kernel 6.6.15, kernel 6.7.3, kernel 6.8-rc1 Doc Type: If docs needed, set a value
Doc Text:
A cache corruption vulnerability was found in the Linux kernel, which affects the regmap cache and is caused by the FIFO Read/Write (R/W) functions regmap_raw_read() and regmap_raw_write() during burst mode. These functions are able to perform IO operations over multiple registers, and if the regmap cache is not disabled manually during this mode, it can lead to cache corruption.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2268456    
Bug Blocks: 2266913    

Description Mauro Matteo Cascella 2024-03-07 16:24:07 UTC
In the Linux kernel, the following vulnerability has been resolved:

serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO

The Linux kernel CVE team has assigned CVE-2023-52488 to this issue.

Upstream advisory:
https://lore.kernel.org/linux-cve-announce/20240229155245.1571576-29-lee@kernel.org/T

Comment 1 Mauro Matteo Cascella 2024-03-07 16:24:45 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2268456]

Comment 2 Justin M. Forbes 2024-03-07 23:36:26 UTC
This was fixed for Fedora with eh 6.7.3 stable kernel updates.

Comment 3 Alex 2024-06-09 12:41:39 UTC
The result of automatic check (that is developed by Alexander Larkin) for this CVE-2023-52488 is: 	SKIP	No affected files built, so skip this CVE	NO			-	-	unknown (where first YES/NO value means if related sources built).