CVE-2023-53598Out-of-bounds Write in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4

Description

In the Linux kernel, the following vulnerability has been resolved: bus: mhi: host: Range check CHDBOFF and ERDBOFF If the value read from the CHDBOFF and ERDBOFF registers is outside the range of the MHI register space then an invalid address might be computed which later causes a kernel panic. Range check the read value to prevent a crash due to bad data from the device.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel5.75.10.192+4
Debianlinux/linux_kernel< 5.10.197-1+3
CVEListV5linux/linux6cd330ae76ffd5c8f6294c423cabde7eeef1b40c372f1752b74572b0a9d2288841eab7db17daccae+6
debiandebian/linux< linux 6.1.37-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53598: In the Linux kernel, the following vulnerability has been resolved: bus: mhi: host: Range check CHDBOFF and ERDBOFF If the value read from the CHDBOFF2025-10-04
GHSA
GHSA-mm9q-jx75-m4x6: In the Linux kernel, the following vulnerability has been resolved: bus: mhi: host: Range check CHDBOFF and ERDBOFF If the value read from the CHDBO2025-10-04

📋Vendor Advisories

2
Red Hat
kernel: bus: mhi: host: Range check CHDBOFF and ERDBOFF2025-10-04
Debian
CVE-2023-53598: linux - In the Linux kernel, the following vulnerability has been resolved: bus: mhi: h...2023