
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-53274 affects the Linux kernel's clock driver for MediaTek MT8183 platform. The vulnerability was discovered when SSPM (System Security and Power Management) related clocks were removed from the MT8183 clock driver, causing issues during the conversion to a new simple-probe mechanism (Ubuntu Security).
The vulnerability stems from the removal of SSPM related clocks in the MT8183 clock driver. When the driver was converted to use the new simple-probe mechanism, it led to out-of-bound writes due to holes in the DT binding or driver from deprecated or unimplemented clocks. The simple-probe mechanism allocates space for all clocks defined in the clock driver, not just the highest index in the DT binding. These errors could go undetected and cause memory corruption, leading to crashes in unrelated areas. KASAN can detect these out-of-bound writes (Ubuntu Security).
The vulnerability can result in memory corruption due to out-of-bound writes, which may lead to system crashes in unrelated areas. In some cases, these errors might go undetected if KASAN is not enabled (Ubuntu Security).
The issue has been resolved by adding the SSPM related clocks back to the MT8183 clock driver to fully implement the DT binding. The SSPM clocks are marked as clocks that should never be turned off (Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."