Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2023-53034
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-16 Apr, 2025 | 14:11
Updated At-03 Nov, 2025 | 19:28
Rejected At-
▼CVE Numbering Authority (CNA)
ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans

In the Linux kernel, the following vulnerability has been resolved: ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans There is a kernel API ntb_mw_clear_trans() would pass 0 to both addr and size. This would make xlate_pos negative. [ 23.734156] switchtec switchtec0: MW 0: part 0 addr 0x0000000000000000 size 0x0000000000000000 [ 23.734158] ================================================================================ [ 23.734172] UBSAN: shift-out-of-bounds in drivers/ntb/hw/mscc/ntb_hw_switchtec.c:293:7 [ 23.734418] shift exponent -1 is negative Ensuring xlate_pos is a positive or zero before BIT.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/ntb/hw/mscc/ntb_hw_switchtec.c
Default Status
unaffected
Versions
Affected
  • From 1e2fd202f8593985cdadca32e0c322f98e7fe7cb before f56951f211f181410a383d305e8d370993e45294 (git)
  • From 1e2fd202f8593985cdadca32e0c322f98e7fe7cb before 5b6857bb3bfb0dae17fab1e42c1e82c204a508b1 (git)
  • From 1e2fd202f8593985cdadca32e0c322f98e7fe7cb before 2429bdf26a0f3950fdd996861e9c1a3873af1dbe (git)
  • From 1e2fd202f8593985cdadca32e0c322f98e7fe7cb before 7ed22f8d8be26225a78cf5e85b2036421a6bf2d5 (git)
  • From 1e2fd202f8593985cdadca32e0c322f98e7fe7cb before c61a3f2df162ba424be0141649a9ef5f28eaccc1 (git)
  • From 1e2fd202f8593985cdadca32e0c322f98e7fe7cb before cb153bdc1812a3375639ed6ca5f147eaefb65349 (git)
  • From 1e2fd202f8593985cdadca32e0c322f98e7fe7cb before 36d32cfb00d42e865396424bb5d340fc0a28870d (git)
  • From 1e2fd202f8593985cdadca32e0c322f98e7fe7cb before 0df2e03e4620548b41891b4e0d1bd9d2e0d8a39a (git)
  • From 1e2fd202f8593985cdadca32e0c322f98e7fe7cb before de203da734fae00e75be50220ba5391e7beecdf9 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/ntb/hw/mscc/ntb_hw_switchtec.c
Default Status
affected
Versions
Affected
  • 4.16
Unaffected
  • From 0 before 4.16 (semver)
  • From 5.4.292 through 5.4.* (semver)
  • From 5.10.236 through 5.10.* (semver)
  • From 5.15.180 through 5.15.* (semver)
  • From 6.1.134 through 6.1.* (semver)
  • From 6.6.87 through 6.6.* (semver)
  • From 6.12.23 through 6.12.* (semver)
  • From 6.13.11 through 6.13.* (semver)
  • From 6.14.2 through 6.14.* (semver)
  • From 6.15 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/f56951f211f181410a383d305e8d370993e45294
N/A
https://git.kernel.org/stable/c/5b6857bb3bfb0dae17fab1e42c1e82c204a508b1
N/A
https://git.kernel.org/stable/c/2429bdf26a0f3950fdd996861e9c1a3873af1dbe
N/A
https://git.kernel.org/stable/c/7ed22f8d8be26225a78cf5e85b2036421a6bf2d5
N/A
https://git.kernel.org/stable/c/c61a3f2df162ba424be0141649a9ef5f28eaccc1
N/A
https://git.kernel.org/stable/c/cb153bdc1812a3375639ed6ca5f147eaefb65349
N/A
https://git.kernel.org/stable/c/36d32cfb00d42e865396424bb5d340fc0a28870d
N/A
https://git.kernel.org/stable/c/0df2e03e4620548b41891b4e0d1bd9d2e0d8a39a
N/A
https://git.kernel.org/stable/c/de203da734fae00e75be50220ba5391e7beecdf9
N/A
Hyperlink: https://git.kernel.org/stable/c/f56951f211f181410a383d305e8d370993e45294
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/5b6857bb3bfb0dae17fab1e42c1e82c204a508b1
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/2429bdf26a0f3950fdd996861e9c1a3873af1dbe
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/7ed22f8d8be26225a78cf5e85b2036421a6bf2d5
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c61a3f2df162ba424be0141649a9ef5f28eaccc1
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/cb153bdc1812a3375639ed6ca5f147eaefb65349
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/36d32cfb00d42e865396424bb5d340fc0a28870d
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/0df2e03e4620548b41891b4e0d1bd9d2e0d8a39a
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/de203da734fae00e75be50220ba5391e7beecdf9
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html
N/A
https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
Resource: N/A
Details not found