CVE-2023-53989 — Improper Validation of Specified Index, Position, or Offset in Input in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 92.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
arm64: mm: fix VA-range sanity check
Both create_mapping_noalloc() and update_mapping_prot() sanity-check
their 'virt' parameter, but the check itself doesn't make much sense.
The condition used today appears to be a historical accident.
The sanity-check condition:
if ((virt >= PAGE_END) && (virt = VA_START) && (virt = PAGE_END) && (virt < VMALLOC_START)) {
[ ... warning here ... ]
return;
}
Correct the condition to check a…
Affected Packages4 packages
▶CVEListV5linux/linux14c127c957c1c6070647c171e72f06e0db275ebf — 9d8d3df71516ec3236d8d93ff029d251377ba4b1+5
🔴Vulnerability Details
3OSV▶
CVE-2023-53989: In the Linux kernel, the following vulnerability has been resolved: arm64: mm: fix VA-range sanity check Both create_mapping_noalloc() and update_mapp↗2025-12-24
GHSA▶
GHSA-49xq-j8p7-h965: In the Linux kernel, the following vulnerability has been resolved:
arm64: mm: fix VA-range sanity check
Both create_mapping_noalloc() and update_ma↗2025-12-24