Bug 2360239 (CVE-2023-53034) - CVE-2023-53034 kernel: ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans
Summary: CVE-2023-53034 kernel: ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec...
Keywords:
Status: NEW
Alias: CVE-2023-53034
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-04-16 15:04 UTC by OSIDB Bzimport
Modified: 2026-02-02 15:25 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2026:1194 0 None None None 2026-01-26 14:09:46 UTC
Red Hat Product Errata RHSA-2026:1441 0 None None None 2026-01-28 00:29:18 UTC
Red Hat Product Errata RHSA-2026:1443 0 None None None 2026-01-28 00:22:15 UTC
Red Hat Product Errata RHSA-2026:1444 0 None None None 2026-01-28 00:36:38 UTC
Red Hat Product Errata RHSA-2026:1494 0 None None None 2026-01-28 15:08:01 UTC
Red Hat Product Errata RHSA-2026:1495 0 None None None 2026-01-28 15:04:18 UTC
Red Hat Product Errata RHSA-2026:1727 0 None None None 2026-02-02 15:25:10 UTC

Description OSIDB Bzimport 2025-04-16 15:04:07 UTC
In the Linux kernel, the following vulnerability has been resolved:

ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans

There is a kernel API ntb_mw_clear_trans() would pass 0 to both addr and
size. This would make xlate_pos negative.

[   23.734156] switchtec switchtec0: MW 0: part 0 addr 0x0000000000000000 size 0x0000000000000000
[   23.734158] ================================================================================
[   23.734172] UBSAN: shift-out-of-bounds in drivers/ntb/hw/mscc/ntb_hw_switchtec.c:293:7
[   23.734418] shift exponent -1 is negative

Ensuring xlate_pos is a positive or zero before BIT.

Comment 1 Avinash Hanwate 2025-04-17 11:29:49 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025041650-CVE-2023-53034-8c3b@gregkh/T

Comment 4 errata-xmlrpc 2026-01-26 14:09:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2026:1194 https://access.redhat.com/errata/RHSA-2026:1194

Comment 5 errata-xmlrpc 2026-01-28 00:22:14 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2026:1443 https://access.redhat.com/errata/RHSA-2026:1443

Comment 6 errata-xmlrpc 2026-01-28 00:29:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2026:1441 https://access.redhat.com/errata/RHSA-2026:1441

Comment 7 errata-xmlrpc 2026-01-28 00:36:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2026:1444 https://access.redhat.com/errata/RHSA-2026:1444

Comment 8 errata-xmlrpc 2026-01-28 15:04:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2026:1495 https://access.redhat.com/errata/RHSA-2026:1495

Comment 9 errata-xmlrpc 2026-01-28 15:08:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2026:1494 https://access.redhat.com/errata/RHSA-2026:1494

Comment 11 errata-xmlrpc 2026-02-02 15:25:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10.0 Extended Update Support

Via RHSA-2026:1727 https://access.redhat.com/errata/RHSA-2026:1727


Note You need to log in before you can comment on or make changes to this bug.