CVE-2023-53989
Arm64 Linux Kernel VA-Range Check Logic Flaw Fix
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves an incorrect sanity-check condition in the Linux kernel's arm64 memory management code. Specifically, the functions create_mapping_noalloc() and update_mapping_prot() perform a check on a virtual address parameter ('virt') that was historically incorrect due to changes in kernel address space layout. The condition excluded certain address ranges unnecessarily, which was a mistake. The fix corrects this condition to properly check against the start of the TTBR1 address space (PAGE_OFFSET), simplifying the logic and ensuring correct validation of virtual addresses when creating or updating memory mappings.
How can this vulnerability impact me? :
The vulnerability could lead to improper validation of virtual addresses during memory mapping operations on arm64 Linux kernels. This might cause incorrect handling of memory regions, potentially leading to unexpected behavior or security issues related to memory management. However, the exact impact is not detailed in the provided information.