CVE-2023-53642Linux vulnerability

6 documents6 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 96.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 7
Latest updateOct 14

Description

In the Linux kernel, the following vulnerability has been resolved: x86: fix clear_user_rep_good() exception handling annotation This code no longer exists in mainline, because it was removed in commit d2c95f9d6802 ("x86: don't use REP_GOOD or ERMS for user memory clearing") upstream. However, rather than backport the full range of x86 memory clearing and copying cleanups, fix the exception table annotation placement for the final 'rep movsb' in clear_user_rep_good(): rather than pointing at

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages5 packages

NVDlinux/linux_kernel6.16.1.29+2
Debianlinux/linux_kernel< 6.1.37-1+2
CVEListV5linux/linux0db7058e8e23e6bbab1b4747ecabd1784c34f50b76ce32682635fe907e0f8e64e039e773e5c7508f+4
debiandebian/linux< linux 6.1.37-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-h9cf-c7q8-gcqh: In the Linux kernel, the following vulnerability has been resolved: x86: fix clear_user_rep_good() exception handling annotation This code no longer2025-10-07
OSV
CVE-2023-53642: In the Linux kernel, the following vulnerability has been resolved: x86: fix clear_user_rep_good() exception handling annotation This code no longer e2025-10-07

📋Vendor Advisories

3
Microsoft
x86: fix clear_user_rep_good() exception handling annotation2025-10-14
Red Hat
kernel: x86: fix clear_user_rep_good() exception handling annotation2025-10-07
Debian
CVE-2023-53642: linux - In the Linux kernel, the following vulnerability has been resolved: x86: fix cl...2023