CVE-2023-53320
BaseFortify
Publication date: 2025-09-16
Last updated on: 2025-12-01
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.19 (inc) to 6.1.16 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.2.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's mpi3mr driver, specifically in the function mpi3mr_get_all_tgt_info(). The function has four issues related to incorrect calculations and memory operations: it assumes an incorrect header size, excludes one device entry incorrectly, uses memcpy() unnecessarily, and specifies an incorrect length for sg_copy_from_buffer(), which leads to a kernel memory out-of-bounds error (KASAN slab-out-of-bounds). These issues can cause memory corruption or crashes.
How can this vulnerability impact me? :
This vulnerability can cause kernel memory corruption or out-of-bounds memory access, potentially leading to system instability, crashes, or security risks such as privilege escalation or denial of service if exploited.