CVE-2023-53989
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/12/2025
Última modificación:
29/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
arm64: mm: fix VA-range sanity check<br />
<br />
Both create_mapping_noalloc() and update_mapping_prot() sanity-check<br />
their &#39;virt&#39; parameter, but the check itself doesn&#39;t make much sense.<br />
The condition used today appears to be a historical accident.<br />
<br />
The sanity-check condition:<br />
<br />
if ((virt >= PAGE_END) && (virt
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/32020fc2a8373d3de35ae6d029d5969a42651e7a
- https://git.kernel.org/stable/c/621619f626cbe702ddbdc54117f3868b8ebd8129
- https://git.kernel.org/stable/c/9d8d3df71516ec3236d8d93ff029d251377ba4b1
- https://git.kernel.org/stable/c/ab9b4008092c86dc12497af155a0901cc1156999
- https://git.kernel.org/stable/c/b03c7fcc5ed854d0e1b27e9abf12428bfa751a37



