
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-52453 affects the Linux kernel's hisi_acc_vfio_pci component. The vulnerability was discovered when the optional PRE_COPY support was added to speed up device compatibility checks, which failed to update the saving/resuming data pointers based on the fd offset. This vulnerability affects Linux kernel versions from 6.2 up to (excluding) 6.6.14 and versions from 6.7 up to (excluding) 6.7.2 (NVD).
The vulnerability stems from incorrect pointer handling in the hisi_acc_vfio_pci driver. When PRE_COPY support was implemented, the code failed to properly update data pointers during save and resume operations based on file descriptor offsets. This results in migration data corruption. The issue has a CVSS v3.1 Base Score of 5.5 MEDIUM (Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) (NVD).
When exploited, this vulnerability leads to migration data corruption. When the device is started on the destination system, it can result in errors including qm_axi_rresp errors and qm sq doorbell timeouts. This primarily affects system availability through device malfunction (Kernel Patch).
The vulnerability has been patched in the Linux kernel. The fix involves correctly updating the migration data pointers by properly handling the fd offset during save and resume operations. The patch is available in Linux kernel versions 6.6.14 and 6.7.2 and later (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."