CVE-2023-53642
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-02-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's x86 architecture code, specifically in the exception handling annotation for the clear_user_rep_good() function. The annotation pointed to the wrong instruction, so when a user memory access caused an exception, the kernel's exception handler could not properly identify the faulting instruction. Instead of returning an error (-EFAULT), the kernel would generate a kernel oops (a crash report), which looks like a filesystem bug rather than an exception annotation issue. The vulnerability was fixed by correcting the exception table annotation to point to the actual instruction causing the user space access.
How can this vulnerability impact me? :
If this vulnerability is triggered, it can cause the Linux kernel to crash or produce a kernel oops report instead of properly handling a user memory access exception. This can lead to system instability or unexpected crashes, potentially affecting system reliability and availability.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by correcting the exception table annotation placement in the Linux kernel code for the clear_user_rep_good() function. To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix or later. The fix involves applying the patch that corrects the exception handling annotation or upgrading to a kernel version that has removed the problematic code and implemented the fix described.