-

CVE-2023-53331

In the Linux kernel, the following vulnerability has been resolved:

pstore/ram: Check start of empty przs during init

After commit 30696378f68a ("pstore/ram: Do not treat empty buffers as
valid"), initialization would assume a prz was valid after seeing that
the buffer_size is zero (regardless of the buffer start position). This
unchecked start value means it could be outside the bounds of the buffer,
leading to future access panics when written to:

 sysdump_panic_event+0x3b4/0x5b8
 atomic_notifier_call_chain+0x54/0x90
 panic+0x1c8/0x42c
 die+0x29c/0x2a8
 die_kernel_fault+0x68/0x78
 __do_kernel_fault+0x1c4/0x1e0
 do_bad_area+0x40/0x100
 do_translation_fault+0x68/0x80
 do_mem_abort+0x68/0xf8
 el1_da+0x1c/0xc0
 __raw_writeb+0x38/0x174
 __memcpy_toio+0x40/0xac
 persistent_ram_update+0x44/0x12c
 persistent_ram_write+0x1a8/0x1b8
 ramoops_pstore_write+0x198/0x1e8
 pstore_console_write+0x94/0xe0
 ...

To avoid this, also check if the prz start is 0 during the initialization
phase. If not, the next prz sanity check case will discover it (start >
size) and zap the buffer back to a sane state.

[kees: update commit log with backtrace and clarifications]

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 89312657337e6e03ad6e9ea1a462bd9c158c85c8
Version e1e3a46706bd4037e8b7407dc660ae6e05b8ac56
Status affected
Version < c807ccdd812d18985860504b503899f3140a9549
Version 265242d82a3c6a8bd9120d06b4801f8d7ae9a346
Status affected
Version < e972231db29b5d1dccc13bf9d5ba55b6979a69ed
Version 30696378f68a9e3dad6bfe55938b112e72af00c2
Status affected
Version < dc2f60de9a7d3efd982440117dab5579898d808c
Version 30696378f68a9e3dad6bfe55938b112e72af00c2
Status affected
Version < fedecaeef88899d940b69368c996e8b3b0b8650d
Version 30696378f68a9e3dad6bfe55938b112e72af00c2
Status affected
Version < e95d7a8a6edd14f8fab44c777dd7281db91f6ae2
Version 30696378f68a9e3dad6bfe55938b112e72af00c2
Status affected
Version < f77990358628b01bdc03752126ff5f716ea37615
Version 30696378f68a9e3dad6bfe55938b112e72af00c2
Status affected
Version < 25fb4e3402d46f425ec135ef6f09792a4c1b3003
Version 30696378f68a9e3dad6bfe55938b112e72af00c2
Status affected
Version < fe8c3623ab06603eb760444a032d426542212021
Version 30696378f68a9e3dad6bfe55938b112e72af00c2
Status affected
Version ec7f99261da9a20d63cbd273511a11a2efe698f2
Status affected
Version f250e4c562a3bd106575032666e9ef46f31231f8
Status affected
Version fffdbf586866e9500b53c9d4b061d3983720375a
Status affected
Version 9e969ba431b46b1891c88cea36f722f3bfe8a180
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.0
Status affected
Version < 5.0
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.326
Status unaffected
Version <= 4.19.*
Version 4.19.295
Status unaffected
Version <= 5.4.*
Version 5.4.257
Status unaffected
Version <= 5.10.*
Version 5.10.195
Status unaffected
Version <= 5.15.*
Version 5.15.132
Status unaffected
Version <= 6.1.*
Version 6.1.53
Status unaffected
Version <= 6.4.*
Version 6.4.16
Status unaffected
Version <= 6.5.*
Version 6.5.3
Status unaffected
Version <= *
Version 6.6
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.126
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String