CVE-2023-53699Linux vulnerability

6 documents5 sources
Severity
N/A
No vector
EPSS
0.0%
top 92.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 22

Description

In the Linux kernel, the following vulnerability has been resolved: riscv: move memblock_allow_resize() after linear mapping is ready The initial memblock metadata is accessed from kernel image mapping. The regions arrays need to "reallocated" from memblock and accessed through linear mapping to cover more memblock regions. So the resizing should not be allowed until linear mapping is ready. Note that there are memblock allocations when building linear mapping. This patch is similar to 24cc61

Affected Packages4 packages

Linuxlinux/linux_kernel5.3.05.15.121+2
Debianlinux/linux_kernel< 6.1.52-1+2
CVEListV5linux/linux671f9a3e2e24cdeb2d2856abee7422f093e23e29a4284246fca2ef482a8fcf5ad7d2c33a45b41e9c+4
debiandebian/linux< linux 6.1.52-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2023-53699: In the Linux kernel, the following vulnerability has been resolved: riscv: move memblock_allow_resize() after linear mapping is ready The initial memb2025-10-22
OSV
riscv: move memblock_allow_resize() after linear mapping is ready2025-10-22
GHSA
GHSA-q328-fmmj-x9cj: In the Linux kernel, the following vulnerability has been resolved: riscv: move memblock_allow_resize() after linear mapping is ready The initial me2025-10-22

📋Vendor Advisories

2
Red Hat
kernel: riscv: move memblock_allow_resize() after linear mapping is ready2025-10-22
Debian
CVE-2023-53699: linux - In the Linux kernel, the following vulnerability has been resolved: riscv: move...2023