-
CVE-2023-53250
- EPSS 0.02%
- Veröffentlicht 15.09.2025 14:46:20
- Zuletzt bearbeitet 15.09.2025 15:22:27
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: firmware: dmi-sysfs: Fix null-ptr-deref in dmi_sysfs_register_handle KASAN reported a null-ptr-deref error: KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] CPU: 0 PID: 1373 Comm: modprobe Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) RIP: 0010:dmi_sysfs_entry_release ... Call Trace: <TASK> kobject_put dmi_sysfs_register_handle (drivers/firmware/dmi-sysfs.c:540) dmi_sysfs dmi_decode_table (drivers/firmware/dmi_scan.c:133) dmi_walk (drivers/firmware/dmi_scan.c:1115) dmi_sysfs_init (drivers/firmware/dmi-sysfs.c:149) dmi_sysfs do_one_initcall (init/main.c:1296) ... Kernel panic - not syncing: Fatal exception Kernel Offset: 0x4000000 from 0xffffffff81000000 ---[ end Kernel panic - not syncing: Fatal exception ]--- It is because previous patch added kobject_put() to release the memory which will call dmi_sysfs_entry_release() and list_del(). However, list_add_tail(entry->list) is called after the error block, so the list_head is uninitialized and cannot be deleted. Move error handling to after list_add_tail to fix this.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
b4fe158259fb5fead52ff2b55841ec5c39492604
Version
fdffa4ad8f6bf1ece877edfb807f2b2c729d8578
Status
affected
Version <
e851996b32264e78a10863c2ac41a8689d7b9252
Version
660ba678f9998aca6db74f2dd912fa5124f0fa31
Status
affected
Version <
5d0492d1d934642bdfd2057acc1b56f4b57be465
Version
660ba678f9998aca6db74f2dd912fa5124f0fa31
Status
affected
Version <
18e126e97c961f7a93823795c879d7c085fe5098
Version
660ba678f9998aca6db74f2dd912fa5124f0fa31
Status
affected
Version
a9bfb37d6ba7c376b0d53337a4c5f5ff324bd725
Status
affected
Version
ed38d04342dfbe9e5aca745c8b5eb4188a74f0ef
Status
affected
Version
c66cc3c62870a27ea8f060a7e4c1ad8d26dd3f0d
Status
affected
Version
a724634b2a49f6ff0177a9e19a5a92fc1545e1b7
Status
affected
Version
985706bd3bbeffc8737bc05965ca8d24837bc7db
Status
affected
Version
3ba359ebe914ac3f8c6c832b28007c14c39d3766
Status
affected
Version
ec752973aa721ee281d5441e497364637c626c7b
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.19
Status
affected
Version <
5.19
Version
0
Status
unaffected
Version <=
5.15.*
Version
5.15.99
Status
unaffected
Version <=
6.1.*
Version
6.1.16
Status
unaffected
Version <=
6.2.*
Version
6.2.3
Status
unaffected
Version <=
*
Version
6.3
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.047 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|