-
CVE-2023-53331
- EPSS 0.04%
- Published 16.09.2025 16:12:06
- Last modified 17.09.2025 14:18:55
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: pstore/ram: Check start of empty przs during init After commit 30696378f68a ("pstore/ram: Do not treat empty buffers as valid"), initialization would assume a prz was valid after seeing that the buffer_size is zero (regardless of the buffer start position). This unchecked start value means it could be outside the bounds of the buffer, leading to future access panics when written to: sysdump_panic_event+0x3b4/0x5b8 atomic_notifier_call_chain+0x54/0x90 panic+0x1c8/0x42c die+0x29c/0x2a8 die_kernel_fault+0x68/0x78 __do_kernel_fault+0x1c4/0x1e0 do_bad_area+0x40/0x100 do_translation_fault+0x68/0x80 do_mem_abort+0x68/0xf8 el1_da+0x1c/0xc0 __raw_writeb+0x38/0x174 __memcpy_toio+0x40/0xac persistent_ram_update+0x44/0x12c persistent_ram_write+0x1a8/0x1b8 ramoops_pstore_write+0x198/0x1e8 pstore_console_write+0x94/0xe0 ... To avoid this, also check if the prz start is 0 during the initialization phase. If not, the next prz sanity check case will discover it (start > size) and zap the buffer back to a sane state. [kees: update commit log with backtrace and clarifications]
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
89312657337e6e03ad6e9ea1a462bd9c158c85c8
Version
e1e3a46706bd4037e8b7407dc660ae6e05b8ac56
Status
affected
Version <
c807ccdd812d18985860504b503899f3140a9549
Version
265242d82a3c6a8bd9120d06b4801f8d7ae9a346
Status
affected
Version <
e972231db29b5d1dccc13bf9d5ba55b6979a69ed
Version
30696378f68a9e3dad6bfe55938b112e72af00c2
Status
affected
Version <
dc2f60de9a7d3efd982440117dab5579898d808c
Version
30696378f68a9e3dad6bfe55938b112e72af00c2
Status
affected
Version <
fedecaeef88899d940b69368c996e8b3b0b8650d
Version
30696378f68a9e3dad6bfe55938b112e72af00c2
Status
affected
Version <
e95d7a8a6edd14f8fab44c777dd7281db91f6ae2
Version
30696378f68a9e3dad6bfe55938b112e72af00c2
Status
affected
Version <
f77990358628b01bdc03752126ff5f716ea37615
Version
30696378f68a9e3dad6bfe55938b112e72af00c2
Status
affected
Version <
25fb4e3402d46f425ec135ef6f09792a4c1b3003
Version
30696378f68a9e3dad6bfe55938b112e72af00c2
Status
affected
Version <
fe8c3623ab06603eb760444a032d426542212021
Version
30696378f68a9e3dad6bfe55938b112e72af00c2
Status
affected
Version
ec7f99261da9a20d63cbd273511a11a2efe698f2
Status
affected
Version
f250e4c562a3bd106575032666e9ef46f31231f8
Status
affected
Version
fffdbf586866e9500b53c9d4b061d3983720375a
Status
affected
Version
9e969ba431b46b1891c88cea36f722f3bfe8a180
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
5.0
Status
affected
Version <
5.0
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.326
Status
unaffected
Version <=
4.19.*
Version
4.19.295
Status
unaffected
Version <=
5.4.*
Version
5.4.257
Status
unaffected
Version <=
5.10.*
Version
5.10.195
Status
unaffected
Version <=
5.15.*
Version
5.15.132
Status
unaffected
Version <=
6.1.*
Version
6.1.53
Status
unaffected
Version <=
6.4.*
Version
6.4.16
Status
unaffected
Version <=
6.5.*
Version
6.5.3
Status
unaffected
Version <=
*
Version
6.6
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.126 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|