CVE-2023-53265Out-of-bounds Read in Linux

CWE-125Out-of-bounds Read5 documents5 sources
Severity
7.1HIGHNVD
EPSS
0.0%
top 97.38%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 16

Description

In the Linux kernel, the following vulnerability has been resolved: ubi: ensure that VID header offset + VID header size __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x85/0xad lib/dump_stack.c:106 print_address_description mm/kasan/report.c:317 [inline] print_report.cold.13+0xb6/0x6bb mm/kasan/report.c:433 kasan_report+0xa7/0x11b mm/kasan/report.c:495 crc32_body lib/crc32.c:111 [inline] crc32_le_generic lib/crc32.c:179 [inline] crc32_le_base+0x58c/0x626 lib/crc32.c:197 ubi_io_write_

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:HExploitability: 1.8 | Impact: 5.2

Affected Packages4 packages

NVDlinux/linux_kernel2.6.224.14.308+6
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux801c135ce73d5df1caf3eca35b66a10824ae070761e04db3bec87f7dd10074296deb7d083e2ccade+8
debiandebian/linux< linux 6.1.20-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-6jj6-82pm-r5v3: In the Linux kernel, the following vulnerability has been resolved: ubi: ensure that VID header offset + VID header size __dump_stack lib/dump_stack2025-09-16
OSV
CVE-2023-53265: In the Linux kernel, the following vulnerability has been resolved: ubi: ensure that VID header offset + VID header size __dump_stack lib/dump_stack2025-09-16

📋Vendor Advisories

2
Red Hat
kernel: ubi: ensure that VID header offset + VID header size <= alloc, size2025-09-16
Debian
CVE-2023-53265: linux - In the Linux kernel, the following vulnerability has been resolved: ubi: ensure...2023
CVE-2023-53265 — Out-of-bounds Read in Linux | cvebase