CVE-2023-53768
BaseFortify
Publication date: 2025-12-08
Last updated on: 2025-12-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory allocation bug in the Linux kernel's regmap-irq component. When allocating a 2D array to handle IRQ type registers, the code incorrectly allocates memory based on the number of columns (num_config_regs) instead of the number of rows (num_config_bases). This causes out-of-bounds memory access when num_config_regs is greater than num_config_bases, potentially leading to memory corruption and crashes.
How can this vulnerability impact me? :
This vulnerability can cause memory corruption and crashes in the Linux kernel, which may lead to system instability or denial of service. Specifically, it can cause invalid memory writes that could disrupt normal operation of devices relying on IRQ handling, potentially affecting system reliability.