-

CVE-2023-53250

In the Linux kernel, the following vulnerability has been resolved:

firmware: dmi-sysfs: Fix null-ptr-deref in dmi_sysfs_register_handle

KASAN reported a null-ptr-deref error:

KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
CPU: 0 PID: 1373 Comm: modprobe
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
RIP: 0010:dmi_sysfs_entry_release
...
Call Trace:
 <TASK>
 kobject_put
 dmi_sysfs_register_handle (drivers/firmware/dmi-sysfs.c:540) dmi_sysfs
 dmi_decode_table (drivers/firmware/dmi_scan.c:133)
 dmi_walk (drivers/firmware/dmi_scan.c:1115)
 dmi_sysfs_init (drivers/firmware/dmi-sysfs.c:149) dmi_sysfs
 do_one_initcall (init/main.c:1296)
 ...
Kernel panic - not syncing: Fatal exception
Kernel Offset: 0x4000000 from 0xffffffff81000000
---[ end Kernel panic - not syncing: Fatal exception ]---

It is because previous patch added kobject_put() to release the memory
which will call  dmi_sysfs_entry_release() and list_del().

However, list_add_tail(entry->list) is called after the error block,
so the list_head is uninitialized and cannot be deleted.

Move error handling to after list_add_tail to fix this.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < b4fe158259fb5fead52ff2b55841ec5c39492604
Version fdffa4ad8f6bf1ece877edfb807f2b2c729d8578
Status affected
Version < e851996b32264e78a10863c2ac41a8689d7b9252
Version 660ba678f9998aca6db74f2dd912fa5124f0fa31
Status affected
Version < 5d0492d1d934642bdfd2057acc1b56f4b57be465
Version 660ba678f9998aca6db74f2dd912fa5124f0fa31
Status affected
Version < 18e126e97c961f7a93823795c879d7c085fe5098
Version 660ba678f9998aca6db74f2dd912fa5124f0fa31
Status affected
Version a9bfb37d6ba7c376b0d53337a4c5f5ff324bd725
Status affected
Version ed38d04342dfbe9e5aca745c8b5eb4188a74f0ef
Status affected
Version c66cc3c62870a27ea8f060a7e4c1ad8d26dd3f0d
Status affected
Version a724634b2a49f6ff0177a9e19a5a92fc1545e1b7
Status affected
Version 985706bd3bbeffc8737bc05965ca8d24837bc7db
Status affected
Version 3ba359ebe914ac3f8c6c832b28007c14c39d3766
Status affected
Version ec752973aa721ee281d5441e497364637c626c7b
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.19
Status affected
Version < 5.19
Version 0
Status unaffected
Version <= 5.15.*
Version 5.15.99
Status unaffected
Version <= 6.1.*
Version 6.1.16
Status unaffected
Version <= 6.2.*
Version 6.2.3
Status unaffected
Version <= *
Version 6.3
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.047
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string