CVE-2023-53598
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-04

Last updated on: 2026-03-21

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: bus: mhi: host: Range check CHDBOFF and ERDBOFF If the value read from the CHDBOFF and ERDBOFF registers is outside the range of the MHI register space then an invalid address might be computed which later causes a kernel panic. Range check the read value to prevent a crash due to bad data from the device.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-04
Last Modified
2026-03-21
Generated
2026-05-07
AI Q&A
2025-10-04
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel From 6.3 (inc) to 6.3.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

This vulnerability can cause the Linux kernel to crash unexpectedly (kernel panic) if a device provides bad data in the CHDBOFF or ERDBOFF registers. Such crashes can lead to system instability, downtime, and potential loss of data or service availability.


Can you explain this vulnerability to me?

This vulnerability occurs in the Linux kernel's MHI host driver where the values read from the CHDBOFF and ERDBOFF registers are not properly range-checked. If these values are outside the valid range of the MHI register space, it can lead to the calculation of an invalid address, which subsequently causes a kernel panic (system crash). The fix involves adding range checks to these register values to prevent crashes caused by bad data from the device.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart