-

CVE-2023-53481

In the Linux kernel, the following vulnerability has been resolved:

ubi: ubi_wl_put_peb: Fix infinite loop when wear-leveling work failed

Following process will trigger an infinite loop in ubi_wl_put_peb():

	ubifs_bgt		ubi_bgt
ubifs_leb_unmap
  ubi_leb_unmap
    ubi_eba_unmap_leb
      ubi_wl_put_peb	wear_leveling_worker
                          e1 = rb_entry(rb_first(&ubi->used)
			  e2 = get_peb_for_wl(ubi)
			  ubi_io_read_vid_hdr  // return err (flash fault)
			  out_error:
			    ubi->move_from = ubi->move_to = NULL
			    wl_entry_destroy(ubi, e1)
			      ubi->lookuptbl[e->pnum] = NULL
      retry:
        e = ubi->lookuptbl[pnum];	// return NULL
	if (e == ubi->move_from) {	// NULL == NULL gets true
	  goto retry;			// infinite loop !!!

$ top
  PID USER      PR  NI    VIRT    RES    SHR S  %CPU %MEM     COMMAND
  7676 root     20   0       0      0      0 R 100.0  0.0  ubifs_bgt0_0

Fix it by:
 1) Letting ubi_wl_put_peb() returns directly if wearl leveling entry has
    been removed from 'ubi->lookuptbl'.
 2) Using 'ubi->wl_lock' protecting wl entry deletion to preventing an
    use-after-free problem for wl entry in ubi_wl_put_peb().

Fetch a reproducer in [Link].

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < b40d2fbf47af58377e898b5062077a47bb28a132
Version 43f9b25a9cdd7b177f77f026b1461abd1abbd174
Status affected
Version < f006f596fe851c3b6aae60b79f89f89f0e515d2f
Version 43f9b25a9cdd7b177f77f026b1461abd1abbd174
Status affected
Version < b5be23f6ae610bdb262160a1f294afee6d0e6a69
Version 43f9b25a9cdd7b177f77f026b1461abd1abbd174
Status affected
Version < 8a18856e074479bd050b01e688c58defadce7ab0
Version 43f9b25a9cdd7b177f77f026b1461abd1abbd174
Status affected
Version < 3afaaf6f5867dc4ad383808d4053f428ec7b867d
Version 43f9b25a9cdd7b177f77f026b1461abd1abbd174
Status affected
Version < cc4bc532acda66189bddc03b3fe1ad689d9a48a2
Version 43f9b25a9cdd7b177f77f026b1461abd1abbd174
Status affected
Version < 5af1c643184a5d09ff5b3f334077a4d0a163c677
Version 43f9b25a9cdd7b177f77f026b1461abd1abbd174
Status affected
Version < 4d57a7333e26040f2b583983e1970d9d460e56b0
Version 43f9b25a9cdd7b177f77f026b1461abd1abbd174
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 2.6.25
Status affected
Version < 2.6.25
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.308
Status unaffected
Version <= 4.19.*
Version 4.19.276
Status unaffected
Version <= 5.4.*
Version 5.4.235
Status unaffected
Version <= 5.10.*
Version 5.10.173
Status unaffected
Version <= 5.15.*
Version 5.15.100
Status unaffected
Version <= 6.1.*
Version 6.1.18
Status unaffected
Version <= 6.2.*
Version 6.2.5
Status unaffected
Version <= *
Version 6.3
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.081
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string