{"id":"CVE-2023-53541","summary":"mtd: rawnand: brcmnand: Fix potential out-of-bounds access in oob write","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: rawnand: brcmnand: Fix potential out-of-bounds access in oob write\n\nWhen the oob buffer length is not in multiple of words, the oob write\nfunction does out-of-bounds read on the oob source buffer at the last\niteration. Fix that by always checking length limit on the oob buffer\nread and fill with 0xff when reaching the end of the buffer to the oob\nregisters.","modified":"2026-03-20T12:33:13.144342Z","published":"2025-10-04T15:16:50.765Z","related":["SUSE-SU-2025:21040-1","SUSE-SU-2025:21052-1","SUSE-SU-2025:21056-1","SUSE-SU-2025:21064-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4111-1","SUSE-SU-2025:4128-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4139-1","SUSE-SU-2025:4140-1","SUSE-SU-2025:4141-1","SUSE-SU-2025:4149-1","SUSE-SU-2025:4301-1","SUSE-SU-2025:4320-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53541.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/14b1d00520b4d6a4818364334ce472b79cfc8976"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2353b7bb61e45e7cfd21505d0c6747ac8c9496a1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2bc3d6ac704ea7263175ea3da663fdbbb7f3dd8b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/45fe4ad7f439799ee1b7b5f80bf82e8b34a98d25"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5d53244186c9ac58cb88d76a0958ca55b83a15cd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/648d1150a688698e37f7aaf302860180901cb30e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/aae45746f4aee9818296e0500e0703e9d8caa5b8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d00b031266514a9395124704630b056a5185ec17"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53541.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53541"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"27c5b17cd1b10564fa36f8f51e4b4b41436ecc32"},{"fixed":"2bc3d6ac704ea7263175ea3da663fdbbb7f3dd8b"},{"fixed":"14b1d00520b4d6a4818364334ce472b79cfc8976"},{"fixed":"aae45746f4aee9818296e0500e0703e9d8caa5b8"},{"fixed":"d00b031266514a9395124704630b056a5185ec17"},{"fixed":"2353b7bb61e45e7cfd21505d0c6747ac8c9496a1"},{"fixed":"45fe4ad7f439799ee1b7b5f80bf82e8b34a98d25"},{"fixed":"648d1150a688698e37f7aaf302860180901cb30e"},{"fixed":"5d53244186c9ac58cb88d76a0958ca55b83a15cd"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53541.json"}}],"schema_version":"1.7.5"}