CVE-2023-53826Expired Pointer Dereference in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 85.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9

Description

In the Linux kernel, the following vulnerability has been resolved: ubi: Fix UAF wear-leveling entry in eraseblk_count_seq_show() Wear-leveling entry could be freed in error path, which may be accessed again in eraseblk_count_seq_show(), for example: __erase_worker eraseblk_count_seq_show wl = ubi->lookuptbl[*block_number] if (wl) wl_entry_destroy ubi->lookuptbl[e->pnum] = NULL kmem_cache_free(ubi_wl_entry_slab, e) erase_count = wl->ec // UAF! Wear-leveling entry updating/accessing in ubi->l

Affected Packages4 packages

Linuxlinux/linux_kernel2.6.224.14.308+6
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux801c135ce73d5df1caf3eca35b66a10824ae07073f9b63dfce44a7c3c095dd93d910408e07ab1845+8
debiandebian/linux< linux 6.1.20-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-39w7-pr2v-3x67: In the Linux kernel, the following vulnerability has been resolved: ubi: Fix UAF wear-leveling entry in eraseblk_count_seq_show() Wear-leveling entr2025-12-09
OSV
CVE-2023-53826: In the Linux kernel, the following vulnerability has been resolved: ubi: Fix UAF wear-leveling entry in eraseblk_count_seq_show() Wear-leveling entry2025-12-09
OSV
ubi: Fix UAF wear-leveling entry in eraseblk_count_seq_show()2025-12-09

📋Vendor Advisories

2
Red Hat
kernel: ubi: Fix UAF wear-leveling entry in eraseblk_count_seq_show()2025-12-09
Debian
CVE-2023-53826: linux - In the Linux kernel, the following vulnerability has been resolved: ubi: Fix UA...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-53826 Impact, Exploitability, and Mitigation Steps | Wiz