-

CVE-2023-53480

In the Linux kernel, the following vulnerability has been resolved:

kobject: Add sanity check for kset->kobj.ktype in kset_register()

When I register a kset in the following way:
	static struct kset my_kset;
	kobject_set_name(&my_kset.kobj, "my_kset");
        ret = kset_register(&my_kset);

A null pointer dereference exception is occurred:
[ 4453.568337] Unable to handle kernel NULL pointer dereference at \
virtual address 0000000000000028
... ...
[ 4453.810361] Call trace:
[ 4453.813062]  kobject_get_ownership+0xc/0x34
[ 4453.817493]  kobject_add_internal+0x98/0x274
[ 4453.822005]  kset_register+0x5c/0xb4
[ 4453.825820]  my_kobj_init+0x44/0x1000 [my_kset]
... ...

Because I didn't initialize my_kset.kobj.ktype.

According to the description in Documentation/core-api/kobject.rst:
 - A ktype is the type of object that embeds a kobject.  Every structure
   that embeds a kobject needs a corresponding ktype.

So add sanity check to make sure kset->kobj.ktype is not NULL.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 1792eac72e27f676bf9ebde28a5afea627fb85f0
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 039ec9db2d30032eafa365f5f89b30eca5322b05
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 964e025ceefdf75da46b0133d0c2790de451aeec
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 5df5829158513134ddcaf2184d9286eda7b0bb18
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < f3f6bf22a4f5ba649cf26ae4670de5c7f861bdef
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 48aebbe801e78a8932404c122ed0e880ccedc220
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 1a772881bc059c596d8ca587cbd2a233edce3d3b
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 4d0fe8c52bb3029d83e323c961221156ab98680b
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version <= 4.14.*
Version 4.14.326
Status unaffected
Version <= 4.19.*
Version 4.19.295
Status unaffected
Version <= 5.4.*
Version 5.4.257
Status unaffected
Version <= 5.10.*
Version 5.10.197
Status unaffected
Version <= 5.15.*
Version 5.15.133
Status unaffected
Version <= 6.1.*
Version 6.1.55
Status unaffected
Version <= 6.5.*
Version 6.5.5
Status unaffected
Version <= *
Version 6.6
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.081
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string