CVE-2023-53750Linux vulnerability

6 documents5 sources
Severity
N/A
No vector
EPSS
0.0%
top 90.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 8

Description

In the Linux kernel, the following vulnerability has been resolved: pinctrl: freescale: Fix a memory out of bounds when num_configs is 1 The config passed in by pad wakeup is 1, when num_configs is 1, Configuration [1] should not be fetched, which will be detected by KASAN as a memory out of bounds condition. Modify to get configs[1] when num_configs is 2.

Affected Packages4 packages

Linuxlinux/linux_kernel6.2.06.3.13+1
Debianlinux/linux_kernel< 6.4.4-1+1
CVEListV5linux/linuxf60c9eac54af28d7b5651fe49944bfd5098550e6f85d3cb10f4df5ae3bdb9a9357315c28d781651f+3
debiandebian/linux< linux 6.4.4-1 (forky)

🔴Vulnerability Details

3
OSV
CVE-2023-53750: In the Linux kernel, the following vulnerability has been resolved: pinctrl: freescale: Fix a memory out of bounds when num_configs is 1 The config pa2025-12-08
OSV
pinctrl: freescale: Fix a memory out of bounds when num_configs is 12025-12-08
GHSA
GHSA-383p-pcrh-7q28: In the Linux kernel, the following vulnerability has been resolved: pinctrl: freescale: Fix a memory out of bounds when num_configs is 1 The config2025-12-08

📋Vendor Advisories

2
Red Hat
kernel: pinctrl: freescale: Fix a memory out of bounds when num_configs is 12025-12-08
Debian
CVE-2023-53750: linux - In the Linux kernel, the following vulnerability has been resolved: pinctrl: fr...2023