CVE-2023-53826 — Expired Pointer Dereference in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 85.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 9
Description
In the Linux kernel, the following vulnerability has been resolved:
ubi: Fix UAF wear-leveling entry in eraseblk_count_seq_show()
Wear-leveling entry could be freed in error path, which may be accessed
again in eraseblk_count_seq_show(), for example:
__erase_worker eraseblk_count_seq_show
wl = ubi->lookuptbl[*block_number]
if (wl)
wl_entry_destroy
ubi->lookuptbl[e->pnum] = NULL
kmem_cache_free(ubi_wl_entry_slab, e)
erase_count = wl->ec // UAF!
Wear-leveling entry updating/accessing in ubi->l…
Affected Packages4 packages
▶CVEListV5linux/linux801c135ce73d5df1caf3eca35b66a10824ae0707 — 3f9b63dfce44a7c3c095dd93d910408e07ab1845+8
🔴Vulnerability Details
3GHSA▶
GHSA-39w7-pr2v-3x67: In the Linux kernel, the following vulnerability has been resolved:
ubi: Fix UAF wear-leveling entry in eraseblk_count_seq_show()
Wear-leveling entr↗2025-12-09
OSV▶
CVE-2023-53826: In the Linux kernel, the following vulnerability has been resolved: ubi: Fix UAF wear-leveling entry in eraseblk_count_seq_show() Wear-leveling entry↗2025-12-09