CVE-2023-53182

EUVD-2023-59794
In the Linux kernel, the following vulnerability has been resolved:

ACPICA: Avoid undefined behavior: applying zero offset to null pointer

ACPICA commit 770653e3ba67c30a629ca7d12e352d83c2541b1e

Before this change we see the following UBSAN stack trace in Fuchsia:

  #0    0x000021e4213b3302 in acpi_ds_init_aml_walk(struct acpi_walk_state*, union acpi_parse_object*, struct acpi_namespace_node*, u8*, u32, struct acpi_evaluate_info*, u8) ../../third_party/acpica/source/components/dispatcher/dswstate.c:682 <platform-bus-x86.so>+0x233302
  #1.2  0x000020d0f660777f in ubsan_get_stack_trace() compiler-rt/lib/ubsan/ubsan_diag.cpp:41 <libclang_rt.asan.so>+0x3d77f
  #1.1  0x000020d0f660777f in maybe_print_stack_trace() compiler-rt/lib/ubsan/ubsan_diag.cpp:51 <libclang_rt.asan.so>+0x3d77f
  #1    0x000020d0f660777f in ~scoped_report() compiler-rt/lib/ubsan/ubsan_diag.cpp:387 <libclang_rt.asan.so>+0x3d77f
  #2    0x000020d0f660b96d in handlepointer_overflow_impl() compiler-rt/lib/ubsan/ubsan_handlers.cpp:809 <libclang_rt.asan.so>+0x4196d
  #3    0x000020d0f660b50d in compiler-rt/lib/ubsan/ubsan_handlers.cpp:815 <libclang_rt.asan.so>+0x4150d
  #4    0x000021e4213b3302 in acpi_ds_init_aml_walk(struct acpi_walk_state*, union acpi_parse_object*, struct acpi_namespace_node*, u8*, u32, struct acpi_evaluate_info*, u8) ../../third_party/acpica/source/components/dispatcher/dswstate.c:682 <platform-bus-x86.so>+0x233302
  #5    0x000021e4213e2369 in acpi_ds_call_control_method(struct acpi_thread_state*, struct acpi_walk_state*, union acpi_parse_object*) ../../third_party/acpica/source/components/dispatcher/dsmethod.c:605 <platform-bus-x86.so>+0x262369
  #6    0x000021e421437fac in acpi_ps_parse_aml(struct acpi_walk_state*) ../../third_party/acpica/source/components/parser/psparse.c:550 <platform-bus-x86.so>+0x2b7fac
  #7    0x000021e4214464d2 in acpi_ps_execute_method(struct acpi_evaluate_info*) ../../third_party/acpica/source/components/parser/psxface.c:244 <platform-bus-x86.so>+0x2c64d2
  #8    0x000021e4213aa052 in acpi_ns_evaluate(struct acpi_evaluate_info*) ../../third_party/acpica/source/components/namespace/nseval.c:250 <platform-bus-x86.so>+0x22a052
  #9    0x000021e421413dd8 in acpi_ns_init_one_device(acpi_handle, u32, void*, void**) ../../third_party/acpica/source/components/namespace/nsinit.c:735 <platform-bus-x86.so>+0x293dd8
  #10   0x000021e421429e98 in acpi_ns_walk_namespace(acpi_object_type, acpi_handle, u32, u32, acpi_walk_callback, acpi_walk_callback, void*, void**) ../../third_party/acpica/source/components/namespace/nswalk.c:298 <platform-bus-x86.so>+0x2a9e98
  #11   0x000021e4214131ac in acpi_ns_initialize_devices(u32) ../../third_party/acpica/source/components/namespace/nsinit.c:268 <platform-bus-x86.so>+0x2931ac
  #12   0x000021e42147c40d in acpi_initialize_objects(u32) ../../third_party/acpica/source/components/utilities/utxfinit.c:304 <platform-bus-x86.so>+0x2fc40d
  #13   0x000021e42126d603 in acpi::acpi_impl::initialize_acpi(acpi::acpi_impl*) ../../src/devices/board/lib/acpi/acpi-impl.cc:224 <platform-bus-x86.so>+0xed603

Add a simple check that avoids incrementing a pointer by zero, but
otherwise behaves as before. Note that our findings are against ACPICA
20221020, but the same code exists on master.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 2%
Affected Products (NVD)
VendorProductVersion
linuxlinux_kernel
𝑥
< 4.14.316
linuxlinux_kernel
4.15 ≤
𝑥
< 4.19.284
linuxlinux_kernel
4.20 ≤
𝑥
< 5.4.244
linuxlinux_kernel
5.5 ≤
𝑥
< 5.10.181
linuxlinux_kernel
5.11 ≤
𝑥
< 5.15.113
linuxlinux_kernel
5.16 ≤
𝑥
< 6.1.30
linuxlinux_kernel
6.2 ≤
𝑥
< 6.3.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
linux
bookworm
6.1.148-1
fixed
bookworm (security)
6.1.147-1
fixed
bullseye
5.10.223-1
fixed
bullseye (security)
5.10.237-1
fixed
forky
6.16.3-1
fixed
sid
6.16.7-1
fixed
trixie
6.12.43-1
fixed
trixie (security)
6.12.41-1
fixed
openSUSE logo
openSUSE / SLES Releases
openSUSE Product
Release
cluster-md-kmp-default
suse enterprise server 15 SP5
5.14.21-150500.55.124.1
fixed
dlm-kmp-default
suse enterprise server 15 SP5
5.14.21-150500.55.124.1
fixed
gfs2-kmp-default
suse enterprise server 15 SP5
5.14.21-150500.55.124.1
fixed
kernel-64kb
suse enterprise server 15 SP4
5.14.21-150400.24.179.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.124.1
fixed
kernel-default
suse enterprise server 15 SP4
5.14.21-150400.24.179.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.124.1
fixed
kernel-default-base
suse enterprise server 15 SP4
5.14.21-150400.24.179.1.150400.24.92.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.124.1.150500.6.59.1
fixed
kernel-docs
suse enterprise server 15 SP4
5.14.21-150400.24.179.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.124.1
fixed
kernel-macros
suse enterprise server 15 SP4
5.14.21-150400.24.179.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.124.1
fixed
kernel-obs-build
suse enterprise server 15 SP4
5.14.21-150400.24.179.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.124.1
fixed
kernel-source
suse enterprise server 15 SP4
5.14.21-150400.24.179.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.124.1
fixed
kernel-syms
suse enterprise server 15 SP4
5.14.21-150400.24.179.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.124.1
fixed
kernel-zfcpdump
suse enterprise server 15 SP4
5.14.21-150400.24.179.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.124.1
fixed
ocfs2-kmp-default
suse enterprise server 15 SP5
5.14.21-150500.55.124.1
fixed
reiserfs-kmp-default
suse enterprise server 15 SP4
5.14.21-150400.24.179.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.124.1
fixed
Red Hat logo
Red Hat Enterprise Linux Releases
Red Hat Product
Release
bpftool
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:7.4.0-503.11.1.el9_5
fixed
kernel
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-core
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-debug
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-debug-core
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-debug-devel
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-debug-devel-matched
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-debug-modules
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-debug-modules-core
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-debug-modules-extra
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-devel
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-devel-matched
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-modules
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-modules-core
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-modules-extra
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-abi-stablelists
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-core
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-debug
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-debug-core
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-debug-devel
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-debug-devel-matched
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-debug-modules
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-debug-modules-core
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-debug-modules-extra
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-debug-uki-virt
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-devel
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-devel-matched
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-doc
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-modules
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-modules-core
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-modules-extra
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-core
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-debug
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-debug-core
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-debug-devel
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-debug-kvm
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-debug-modules
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-debug-modules-core
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-debug-modules-extra
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-devel
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-kvm
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-modules
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-modules-core
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-modules-extra
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-tools
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-tools-libs
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-tools-libs-devel
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-uki-virt
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-uki-virt-addons
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-zfcpdump
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-zfcpdump-core
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-zfcpdump-devel
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-zfcpdump-devel-matched
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-zfcpdump-modules
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-zfcpdump-modules-core
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-zfcpdump-modules-extra
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
libperf
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
perf
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
python3-perf
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
rtla
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
rv
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed