CVE-2023-53750
Description
In the Linux kernel, the following vulnerability has been resolved:
pinctrl: freescale: Fix a memory out of bounds when num_configs is 1
The config passed in by pad wakeup is 1, when num_configs is 1, Configuration [1] should not be fetched, which will be detected by KASAN as a memory out of bounds condition. Modify to get configs[1] when num_configs is 2.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2023-53750: Linux kernel pinctrl freescale driver has an out-of-bounds memory read when num_configs=1 via mis-indexed configuration array access.
The vulnerability resides in the Freescale pinctrl driver (pinctrl: freescale) in the Linux kernel. When a pad wakeup configuration is passed with num_configs set to 1, the code incorrectly attempts to fetch configs[1], which is out of bounds for a single-element array. This leads to a memory out-of-bounds read condition that can be detected by KASAN [1].
Exploitation requires the ability to trigger a pad wakeup configuration with num_configs equal to 1. An attacker with local access or the ability to influence the pinctrl configuration could cause the driver to read beyond the allocated buffer, potentially leaking sensitive kernel memory or causing a crash. The root cause is a logic error: the code should only access configs[1] when num_configs is 2 or greater, but the check allows the out-of-bounds read when num_configs == 1 [1].
The impact includes a possible kernel panic or denial of service, as the out-of-bounds read may trigger a crash. In environments where KASAN is enabled, it directly detects the violation, but even without it, undefined behavior can lead to exploitable conditions. No privilege escalation is directly described, but depending on memory layout, an attacker might infer sensitive data.
The fix was applied in the mainline Linux kernel repository via commit 27d9a7585b59. Users should update to a kernel version containing this patch. The vulnerability does not affect the default configuration; it occurs only when specific pinctrl wakeup settings are used [1]. No workaround is documented beyond applying the kernel update.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
3f85d3cb10f4d27d9a7585b599063777ca1e2Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.