In the Linux kernel, the following vulnerability has been resolved:
md/raid10: fix wrong setting of max_corr_read_errors
There is no input check when echo md/max_read_errors and overflow might
occur. Add check of input number.
References
Configurations
Configuration 1 (hide)
|
History
01 Dec 2025, 21:47
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/025fde32fb957a5c271711bc66841f817ff5f299 - Patch | |
| References | () https://git.kernel.org/stable/c/05d10428e8dffed0bac2502f34151729fc189cd3 - Patch | |
| References | () https://git.kernel.org/stable/c/31c805a44b7569ca1017a4714385182d98bba212 - Patch | |
| References | () https://git.kernel.org/stable/c/3c76920e547d4b931bed758bad83fd658dd88b4e - Patch | |
| References | () https://git.kernel.org/stable/c/74050a3fdd4aecfd2cbf74d3c145812ab2744375 - Patch | |
| References | () https://git.kernel.org/stable/c/aef6e98eb772594edd4399625e4e1bbe45971fa1 - Patch | |
| References | () https://git.kernel.org/stable/c/b1d8f38310bce3282374983b229d94edbaf1e570 - Patch | |
| References | () https://git.kernel.org/stable/c/e83cb411aa1c6c9617db9329897f4506ba9e9b9d - Patch | |
| References | () https://git.kernel.org/stable/c/f8b20a405428803bd9881881d8242c9d72c6b2b2 - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | NVD-CWE-noinfo | |
| First Time |
Linux linux Kernel
Linux |
Information
Published : 2025-09-16 17:15
Updated : 2025-12-01 21:47
NVD link : CVE-2023-53313
Mitre link : CVE-2023-53313
CVE.ORG link : CVE-2023-53313
JSON object : View
Products Affected
linux
- linux_kernel
CWE
