-
CVE-2023-53826
- EPSS 0.02%
- Veröffentlicht 09.12.2025 01:29:39
- Zuletzt bearbeitet 09.12.2025 18:37:13
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved:
ubi: Fix UAF wear-leveling entry in eraseblk_count_seq_show()
Wear-leveling entry could be freed in error path, which may be accessed
again in eraseblk_count_seq_show(), for example:
__erase_worker eraseblk_count_seq_show
wl = ubi->lookuptbl[*block_number]
if (wl)
wl_entry_destroy
ubi->lookuptbl[e->pnum] = NULL
kmem_cache_free(ubi_wl_entry_slab, e)
erase_count = wl->ec // UAF!
Wear-leveling entry updating/accessing in ubi->lookuptbl should be
protected by ubi->wl_lock, fix it by adding ubi->wl_lock to serialize
wl entry accessing between wl_entry_destroy() and
eraseblk_count_seq_show().
Fetch a reproducer in [Link].Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
3f9b63dfce44a7c3c095dd93d910408e07ab1845
Version
801c135ce73d5df1caf3eca35b66a10824ae0707
Status
affected
Version <
84250da1c63cb7d421a3b4812b5c2ce2e47d31a1
Version
801c135ce73d5df1caf3eca35b66a10824ae0707
Status
affected
Version <
1cb14c06d6035539ef4215c4ba0871aea71d7c38
Version
801c135ce73d5df1caf3eca35b66a10824ae0707
Status
affected
Version <
9d448dd6bcb61a508204b57ea1f454ba9bac2f24
Version
801c135ce73d5df1caf3eca35b66a10824ae0707
Status
affected
Version <
79548ccdd992707879b4b683b7251c58ddf26f12
Version
801c135ce73d5df1caf3eca35b66a10824ae0707
Status
affected
Version <
84253f3c2dad6be10d30c92626c763d9a9f512ad
Version
801c135ce73d5df1caf3eca35b66a10824ae0707
Status
affected
Version <
a100de2974d208cfca032179b02ed4d1a0a7f143
Version
801c135ce73d5df1caf3eca35b66a10824ae0707
Status
affected
Version <
a240bc5c43130c6aa50831d7caaa02a1d84e1bce
Version
801c135ce73d5df1caf3eca35b66a10824ae0707
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
2.6.22
Status
affected
Version <
2.6.22
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.308
Status
unaffected
Version <=
4.19.*
Version
4.19.276
Status
unaffected
Version <=
5.4.*
Version
5.4.235
Status
unaffected
Version <=
5.10.*
Version
5.10.173
Status
unaffected
Version <=
5.15.*
Version
5.15.100
Status
unaffected
Version <=
6.1.*
Version
6.1.18
Status
unaffected
Version <=
6.2.*
Version
6.2.5
Status
unaffected
Version <=
*
Version
6.3
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.058 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|