CVE-2023-53434
BaseFortify
Publication date: 2025-09-18
Last updated on: 2025-12-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.16 (inc) to 6.1.30 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.3.4 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability relates to the Linux kernel's handling of the i.MX DSP cores' IRAM memory. The hardware specification requires that only 32-bit writes are allowed to this memory region; otherwise, a kernel panic occurs. The vulnerability was due to the lack of a proper custom memory copy and memset implementation that respects this restriction, which could cause the kernel to crash.
How can this vulnerability impact me? :
If exploited or triggered, this vulnerability can cause a kernel panic, leading to a system crash or instability on devices using the affected i.MX DSP cores. This can result in denial of service or unexpected system behavior.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by adding a custom memory copy and memset implementation for the i.MX DSP cores in the Linux kernel to prevent kernel panic caused by improper memory writes. Immediate mitigation would involve updating the Linux kernel to a version that includes this fix.