CVE-2023-53768 — Off-by-one Error in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 90.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 8
Description
In the Linux kernel, the following vulnerability has been resolved:
regmap-irq: Fix out-of-bounds access when allocating config buffers
When allocating the 2D array for handling IRQ type registers in
regmap_add_irq_chip_fwnode(), the intent is to allocate a matrix
with num_config_bases rows and num_config_regs columns.
This is currently handled by allocating a buffer to hold a pointer for
each row (i.e. num_config_bases). After that, the logic attempts to
allocate the memory required to hold …
Affected Packages4 packages
▶CVEListV5linux/linuxfaa87ce9196dbb074d75bd4aecb8bacf18f19b4e — b1a726ad33e585e3d9fa70712df31ae105e4532c+3
🔴Vulnerability Details
3OSV▶
CVE-2023-53768: In the Linux kernel, the following vulnerability has been resolved: regmap-irq: Fix out-of-bounds access when allocating config buffers When allocatin↗2025-12-08
GHSA▶
GHSA-x59p-mm6w-2vq3: In the Linux kernel, the following vulnerability has been resolved:
regmap-irq: Fix out-of-bounds access when allocating config buffers
When allocat↗2025-12-08