-
CVE-2023-53587
- EPSS 0.03%
- Veröffentlicht 04.10.2025 15:44:02
- Zuletzt bearbeitet 06.10.2025 14:56:21
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Sync IRQ works before buffer destruction If something was written to the buffer just before destruction, it may be possible (maybe not in a real system, but it did happen in ARCH=um with time-travel) to destroy the ringbuffer before the IRQ work ran, leading this KASAN report (or a crash without KASAN): BUG: KASAN: slab-use-after-free in irq_work_run_list+0x11a/0x13a Read of size 8 at addr 000000006d640a48 by task swapper/0 CPU: 0 PID: 0 Comm: swapper Tainted: G W O 6.3.0-rc1 #7 Stack: 60c4f20f 0c203d48 41b58ab3 60f224fc 600477fa 60f35687 60c4f20f 601273dd 00000008 6101eb00 6101eab0 615be548 Call Trace: [<60047a58>] show_stack+0x25e/0x282 [<60c609e0>] dump_stack_lvl+0x96/0xfd [<60c50d4c>] print_report+0x1a7/0x5a8 [<603078d3>] kasan_report+0xc1/0xe9 [<60308950>] __asan_report_load8_noabort+0x1b/0x1d [<60232844>] irq_work_run_list+0x11a/0x13a [<602328b4>] irq_work_tick+0x24/0x34 [<6017f9dc>] update_process_times+0x162/0x196 [<6019f335>] tick_sched_handle+0x1a4/0x1c3 [<6019fd9e>] tick_sched_timer+0x79/0x10c [<601812b9>] __hrtimer_run_queues.constprop.0+0x425/0x695 [<60182913>] hrtimer_interrupt+0x16c/0x2c4 [<600486a3>] um_timer+0x164/0x183 [...] Allocated by task 411: save_stack_trace+0x99/0xb5 stack_trace_save+0x81/0x9b kasan_save_stack+0x2d/0x54 kasan_set_track+0x34/0x3e kasan_save_alloc_info+0x25/0x28 ____kasan_kmalloc+0x8b/0x97 __kasan_kmalloc+0x10/0x12 __kmalloc+0xb2/0xe8 load_elf_phdrs+0xee/0x182 [...] The buggy address belongs to the object at 000000006d640800 which belongs to the cache kmalloc-1k of size 1024 The buggy address is located 584 bytes inside of freed 1024-byte region [000000006d640800, 000000006d640c00) Add the appropriate irq_work_sync() so the work finishes before the buffers are destroyed. Prior to the commit in the Fixes tag below, there was only a single global IRQ work, so this issue didn't exist.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
372c5ee537b8366b64b691ba29e9335525e1655e
Version
15693458c4bc0693fd63a50d60f35b628fcf4e29
Status
affected
Version <
2702b67f59d455072a08dc40312f9b090d4dec04
Version
15693458c4bc0693fd63a50d60f35b628fcf4e29
Status
affected
Version <
2399b1fda025e939b6fb1ac94505bcf718534e65
Version
15693458c4bc0693fd63a50d60f35b628fcf4e29
Status
affected
Version <
1c99f65d6af2a454bfd5207b4f6a97c8474a1191
Version
15693458c4bc0693fd63a50d60f35b628fcf4e29
Status
affected
Version <
c63741e872fcfb10e153517750f7908f0c00f60d
Version
15693458c4bc0693fd63a50d60f35b628fcf4e29
Status
affected
Version <
d9834abd8b24d1fe8092859e436fe1e0fd467c61
Version
15693458c4bc0693fd63a50d60f35b628fcf4e29
Status
affected
Version <
fc6858b7f8e1221f62ce8c6ff8a13a349c32cd76
Version
15693458c4bc0693fd63a50d60f35b628fcf4e29
Status
affected
Version <
0a65165bd24ee9231191597b7c232376fcd70cdb
Version
15693458c4bc0693fd63a50d60f35b628fcf4e29
Status
affected
Version <
675751bb20634f981498c7d66161584080cc061e
Version
15693458c4bc0693fd63a50d60f35b628fcf4e29
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.10
Status
affected
Version <
3.10
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.315
Status
unaffected
Version <=
4.19.*
Version
4.19.283
Status
unaffected
Version <=
5.4.*
Version
5.4.243
Status
unaffected
Version <=
5.10.*
Version
5.10.180
Status
unaffected
Version <=
5.15.*
Version
5.15.111
Status
unaffected
Version <=
6.1.*
Version
6.1.28
Status
unaffected
Version <=
6.2.*
Version
6.2.15
Status
unaffected
Version <=
6.3.*
Version
6.3.2
Status
unaffected
Version <=
*
Version
6.4
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.084 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|