{"id":"CVE-2023-53598","summary":"bus: mhi: host: Range check CHDBOFF and ERDBOFF","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nbus: mhi: host: Range check CHDBOFF and ERDBOFF\n\nIf the value read from the CHDBOFF and ERDBOFF registers is outside the\nrange of the MHI register space then an invalid address might be computed\nwhich later causes a kernel panic.  Range check the read value to prevent\na crash due to bad data from the device.","modified":"2026-04-11T12:46:50.045569Z","published":"2025-10-04T15:44:10.380Z","related":["SUSE-SU-2025:4149-1","SUSE-SU-2025:4320-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53598.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2343385fe6eed11d0432ab42a97b3ca4aef06a99"},{"type":"WEB","url":"https://git.kernel.org/stable/c/372f1752b74572b0a9d2288841eab7db17daccae"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4e584127ec2bd42a37c88badb49df409f21fa40a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6a0c637bfee69a74c104468544d9f2a6579626d0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/83bf6b87e2dd053d95d89eb2f01ae885f9e568db"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a2cbb1a45a0c86ce77839c0875414efe1a89315e"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53598.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53598"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"6cd330ae76ffd5c8f6294c423cabde7eeef1b40c"},{"fixed":"372f1752b74572b0a9d2288841eab7db17daccae"},{"fixed":"2343385fe6eed11d0432ab42a97b3ca4aef06a99"},{"fixed":"a2cbb1a45a0c86ce77839c0875414efe1a89315e"},{"fixed":"83bf6b87e2dd053d95d89eb2f01ae885f9e568db"},{"fixed":"4e584127ec2bd42a37c88badb49df409f21fa40a"},{"fixed":"6a0c637bfee69a74c104468544d9f2a6579626d0"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53598.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.7.0"},{"fixed":"5.10.192"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.112"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.28"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.2.15"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.3.0"},{"fixed":"6.3.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53598.json"}}],"schema_version":"1.7.5"}