CVE-2023-53184
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-12-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.42 |
| linux | linux_kernel | 6.4.7 |
| linux | linux_kernel | 6.5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's arm64 architecture related to SME (Scalable Matrix Extension) vector length handling. When changing the SVE (Scalable Vector Extension) vector length, the kernel reallocates the buffer for the SVE state. However, the reallocation was done before updating the vector length in the task structure, causing the allocation to use the old vector length. This can lead to memory corruption because the buffer may be undersized for the new vector length. The fix moves the update of the vector length before the allocation to ensure the buffer is correctly sized.
How can this vulnerability impact me? :
This vulnerability can lead to memory corruption in the Linux kernel on arm64 systems when changing the SVE vector length. Memory corruption can cause system instability, crashes, or potentially allow attackers to execute arbitrary code or escalate privileges if exploited.