๐Ÿ” CVE Alert

CVE-2023-53034

UNKNOWN 0.0

ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans There is a kernel API ntb_mw_clear_trans() would pass 0 to both addr and size. This would make xlate_pos negative. [ 23.734156] switchtec switchtec0: MW 0: part 0 addr 0x0000000000000000 size 0x0000000000000000 [ 23.734158] ================================================================================ [ 23.734172] UBSAN: shift-out-of-bounds in drivers/ntb/hw/mscc/ntb_hw_switchtec.c:293:7 [ 23.734418] shift exponent -1 is negative Ensuring xlate_pos is a positive or zero before BIT.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 16, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1e2fd202f8593985cdadca32e0c322f98e7fe7cb < f56951f211f181410a383d305e8d370993e45294 1e2fd202f8593985cdadca32e0c322f98e7fe7cb < 5b6857bb3bfb0dae17fab1e42c1e82c204a508b1 1e2fd202f8593985cdadca32e0c322f98e7fe7cb < 2429bdf26a0f3950fdd996861e9c1a3873af1dbe 1e2fd202f8593985cdadca32e0c322f98e7fe7cb < 7ed22f8d8be26225a78cf5e85b2036421a6bf2d5 1e2fd202f8593985cdadca32e0c322f98e7fe7cb < c61a3f2df162ba424be0141649a9ef5f28eaccc1 1e2fd202f8593985cdadca32e0c322f98e7fe7cb < cb153bdc1812a3375639ed6ca5f147eaefb65349 1e2fd202f8593985cdadca32e0c322f98e7fe7cb < 36d32cfb00d42e865396424bb5d340fc0a28870d 1e2fd202f8593985cdadca32e0c322f98e7fe7cb < 0df2e03e4620548b41891b4e0d1bd9d2e0d8a39a 1e2fd202f8593985cdadca32e0c322f98e7fe7cb < de203da734fae00e75be50220ba5391e7beecdf9
Linux / Linux
4.16

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/f56951f211f181410a383d305e8d370993e45294 git.kernel.org: https://git.kernel.org/stable/c/5b6857bb3bfb0dae17fab1e42c1e82c204a508b1 git.kernel.org: https://git.kernel.org/stable/c/2429bdf26a0f3950fdd996861e9c1a3873af1dbe git.kernel.org: https://git.kernel.org/stable/c/7ed22f8d8be26225a78cf5e85b2036421a6bf2d5 git.kernel.org: https://git.kernel.org/stable/c/c61a3f2df162ba424be0141649a9ef5f28eaccc1 git.kernel.org: https://git.kernel.org/stable/c/cb153bdc1812a3375639ed6ca5f147eaefb65349 git.kernel.org: https://git.kernel.org/stable/c/36d32cfb00d42e865396424bb5d340fc0a28870d git.kernel.org: https://git.kernel.org/stable/c/0df2e03e4620548b41891b4e0d1bd9d2e0d8a39a git.kernel.org: https://git.kernel.org/stable/c/de203da734fae00e75be50220ba5391e7beecdf9 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html