CVE-2023-53272
BaseFortify
Publication date: 2025-09-16
Last updated on: 2025-12-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.8 (inc) to 5.10.188 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.121 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.40 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.4.5 (exc) |
| linux | linux_kernel | 6.5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a shift-out-of-bounds error in the Linux kernel's ENA network driver. It occurs during an exponential backoff calculation used for resetting ENA adapters. The shift exponent can exceed the size limit of a 32-bit unsigned integer, causing an overflow and potentially triggering a UBSAN (Undefined Behavior Sanitizer) panic. The fix caps the exponent value to prevent this overflow and avoid large reset delays that cause instability.
How can this vulnerability impact me? :
This vulnerability can cause ENA network adapters to reset unexpectedly and may lead to kernel panics due to the UBSAN failure. This can result in network instability or downtime on affected systems using ENA adapters, impacting system reliability and availability.