CVE-2023-53578
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-23
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | From 5.16 (inc) to 6.1.25 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.2.12 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.108 (exc) |
| linux | linux_kernel | From 5.6 (inc) to 5.10.178 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-908 | The product uses or accesses a resource that has not been initialized. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an uninitialized variable access bug in the Linux kernel's qrtr_tx_resume() function within the QRTR (Qualcomm IPC Router) subsystem. It occurs because a size check was missing when handling a specific packet type (QRTR_TYPE_RESUME_TX), leading to the use of an uninitialized variable. This happens when the skb->len (socket buffer length) is less than the expected size of a control packet, causing the function to access uninitialized memory.
How can this vulnerability impact me? :
The impact of this vulnerability could include potential kernel instability or crashes due to accessing uninitialized memory. This might lead to denial of service or unpredictable behavior in systems using the affected Linux kernel QRTR subsystem. However, specific exploit scenarios or further impacts are not detailed.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by adding a size check in the qrtr_endpoint_post() function to prevent uninitialized variable access. To mitigate this vulnerability immediately, you should update your Linux kernel to a version that includes this fix for the qrtr subsystem. Applying the latest kernel patches or upgrading to a kernel version released after the fix was applied will address this issue.