SB2024060101 - NULL pointer dereference in Linux kernel cpu sgx
Published: June 1, 2024 Updated: May 14, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) NULL pointer dereference (CVE-ID: CVE-2023-52568)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sgx_encl_eldu(), __sgx_encl_load_page() and sgx_encl_eaug_page() functions in arch/x86/kernel/cpu/sgx/encl.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/811ba2ef0cb6402672e64ba1419d6ef95aa3405d
- https://git.kernel.org/stable/c/1348f7f15d7c7798456856bee74a4235c2da994e
- https://git.kernel.org/stable/c/c6c2adcba50c2622ed25ba5d5e7f05f584711358
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.56
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.6
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6