CVE-2023-53480NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 1

Description

In the Linux kernel, the following vulnerability has been resolved: kobject: Add sanity check for kset->kobj.ktype in kset_register() When I register a kset in the following way: static struct kset my_kset; kobject_set_name(&my_kset.kobj, "my_kset"); ret = kset_register(&my_kset); A null pointer dereference exception is occurred: [ 4453.568337] Unable to handle kernel NULL pointer dereference at \ virtual address 0000000000000028 ... ... [ 4453.810361] Call trace: [ 4453.813062] kobject_get_o

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel4.194.19.295+5
Debianlinux/linux_kernel< 5.10.197-1+3
CVEListV5linux/linux5f81880d5204ee2388fd9a75bb850ccd526885b7039ec9db2d30032eafa365f5f89b30eca5322b05+7
debiandebian/linux< linux 6.1.55-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53480: In the Linux kernel, the following vulnerability has been resolved: kobject: Add sanity check for kset->kobj2025-10-01
GHSA
GHSA-8xg4-jw8q-mm7v: In the Linux kernel, the following vulnerability has been resolved: kobject: Add sanity check for kset->kobj2025-10-01

📋Vendor Advisories

2
Red Hat
kernel: kobject: Add sanity check for kset->kobj.ktype in kset_register()2025-10-01
Debian
CVE-2023-53480: linux - In the Linux kernel, the following vulnerability has been resolved: kobject: Ad...2023